First published: Thu Mar 20 2025(Updated: )
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘marker_title’, 'notification_content', and 'stt_button_text' parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.3.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Absolute Addons For Elementor | <=2.8.3 | |
HT Mega - Absolute Addons for Elementor WordPress Page Builder | <2.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1802 is classified as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2025-1802, update the HT Mega – Absolute Addons For Elementor plugin to version 2.8.4 or later.
All versions of the HT Mega – Absolute Addons For Elementor plugin up to and including 2.8.3 are affected by CVE-2025-1802.
CVE-2025-1802 is a stored cross-site scripting (XSS) vulnerability.
The parameters involved in CVE-2025-1802 are 'marker_title', 'notification_content', and 'stt_button_text'.