Description
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.
Published: 2025-03-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS via the Countdown widget allowing injection of arbitrary scripts that run for any page visitor
Action: Patch
AI Analysis

Impact

The HT Mega – Absolute Addons For Elementor plugin contains a DOM‑based stored cross‑site scripting flaw in its Countdown widget. User‑supplied attributes are not sanitized, allowing a contributor‑level attacker to inject JavaScript that is stored with the page. When any visitor loads the affected page, the script runs in the visitor’s browser. The description does not state specific downstream effects; based on common XSS outcomes, one could infer that an attacker might steal information or deface the site, but these results are not explicitly documented here.

Affected Systems

The vulnerability affects the HT Mega Addons for Elementor – Elementor Widgets & Template Builder plugin by devitemsllc. All versions up to and including 2.8.2 are vulnerable; version 2.8.3 and later contain the fix.

Risk and Exploitability

The CVSS score of 6.4 indicates medium severity, and the EPSS score of less than 1 % implies a low probability of exploitation in the wild. Because the flaw requires authenticated contributor-level access to inject the payload, an attacker must first obtain that role or compromise an account with it, then the stored script is delivered to every user who opens the page. The vulnerability is not yet listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 21, 2026 at 22:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HT Mega to version 2.8.3 or later, where the Countdown widget is fixed
  • If an upgrade is not immediately possible, disable or remove the Countdown widget from all templates and pages to eliminate the injection surface
  • Restrict Contributor and higher roles to only the sites and content where they are truly required, limiting the number of accounts that can inject scripts via the widget

Generated by OpenCVE AI on April 21, 2026 at 22:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7381 The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.
History

Mon, 24 Mar 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Hasthemes
Hasthemes ht Mega
CPEs cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*
Vendors & Products Hasthemes
Hasthemes ht Mega

Mon, 10 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 08 Mar 2025 02:15:00 +0000

Type Values Removed Values Added
Description The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.
Title HT Mega – Absolute Addons For Elementor <= 2.8.2 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via Countdown Widget
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hasthemes Ht Mega
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:50.857Z

Reserved: 2025-02-12T20:06:58.478Z

Link: CVE-2025-1261

cve-icon Vulnrichment

Updated: 2025-03-10T16:06:33.268Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-08T02:15:34.147

Modified: 2025-03-24T18:32:02.397

Link: CVE-2025-1261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:15:45Z

Weaknesses