First published: Tue Mar 12 2024(Updated: )
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘border_type’ attribute of the Post Carousel widget in all versions up to, and including, 2.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Absolute Addons For Elementor | <=2.4.4 | |
HT Mega - Absolute Addons for Elementor WordPress Page Builder | <=2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1421 is classified as high due to the potential for stored cross-site scripting attacks.
To fix CVE-2024-1421, update the HT Mega – Absolute Addons For Elementor plugin to version 2.4.5 or later.
CVE-2024-1421 affects all versions of the HT Mega – Absolute Addons For Elementor plugin up to and including 2.4.4.
The impact of CVE-2024-1421 allows an attacker to inject malicious scripts that can execute in the context of a user visiting the site.
Yes, after applying the necessary updates, the HT Mega – Absolute Addons For Elementor plugin is considered secure against this vulnerability.