First published: Tue May 21 2024(Updated: )
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘popover_header_text’ parameter in versions up to, and including, 2.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Absolute Addons For Elementor | <=2.5.2 | |
HT Mega - Absolute Addons for Elementor WordPress Page Builder | <2.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4876 is rated as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2024-4876, upgrade the HT Mega – Absolute Addons For Elementor plugin to version 2.5.3 or later.
CVE-2024-4876 affects users of the HT Mega – Absolute Addons For Elementor plugin for WordPress versions up to and including 2.5.2.
CVE-2024-4876 can be exploited to perform stored cross-site scripting attacks, allowing attackers to inject malicious scripts.
The vulnerable input parameter in CVE-2024-4876 is the ‘popover_header_text’ parameter.