First published: Tue May 21 2024(Updated: )
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress HT Mega | <2.5.3 | |
HT Mega - Absolute Addons for Elementor Page Builder | <=2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4875 is considered a medium severity vulnerability due to the potential for unauthorized data modification.
To fix CVE-2024-4875, update the HT Mega – Absolute Addons For Elementor plugin to version 2.5.3 or higher.
CVE-2024-4875 affects all versions up to and including 2.5.2 of the HT Mega – Absolute Addons For Elementor plugin.
CVE-2024-4875 allows authenticated attackers to modify or potentially loss data through unauthorized actions.
The vendor responsible for CVE-2024-4875 is HasThemes, which developed the HT Mega – Absolute Addons For Elementor plugin.