Description
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Gutenberg blocks in all versions up to, and including, 3.0.0 due to insufficient input validation on user-supplied HTML tag names. This is due to the lack of a tag name whitelist allowing dangerous tags like 'script', 'iframe', and 'object' to be injected even though tag_escape() is used for sanitization. While some blocks use esc_html() for content, this can be bypassed using JavaScript encoding techniques (unquoted strings, backticks, String.fromCharCode()). This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The HT Mega Addons for Elementor plugin for WordPress is vulnerable to stored cross‑site scripting through its Gutenberg blocks. The flaw stems from a missing whitelist for user‑supplied HTML tag names, allowing dangerous tags such as script, iframe, and object to be injected. Although tag_escape() is used, the lack of a tag name filter permits these tags to survive sanitisation, and the use of esc_html() for block content can be bypassed with JavaScript encoding techniques like unquoted strings, backticks, or String.fromCharCode(). Consequently, an authenticated user with contributor level access or higher can inject arbitrary web scripts that execute whenever any visitor loads the affected page.

Affected Systems

WordPress sites that have installed the HT Mega Addons for Elementor – Elementor Widgets & Template Builder plugin from devitemsllc. All released versions up to and including version 3.0.0 are affected.

Risk and Exploitability

The vulnerability receives a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1%, suggesting a low probability of immediate exploitation. It is not listed in the CISA KEV catalog. Because the attacker must be authenticated with contributor or greater privileges, the attack vector is limited to authenticated users within a WordPress installation that has the vulnerable plugin enabled. Successful exploitation allows arbitrary JavaScript execution, enabling session hijacking, defacement, or credential theft for any user who views a page containing the injected content.

Generated by OpenCVE AI on April 21, 2026 at 18:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HT Mega Addons for Elementor plugin to any release newer than version 3.0.0.
  • If an upgrade is unavailable, remove the plugin entirely or disable its Gutenberg blocks until a patch is released.
  • Implement site‑wide input validation that strips or encodes any user‑supplied tag names, and apply a strict whitelist that excludes script, iframe, and object tags.

Generated by OpenCVE AI on April 21, 2026 at 18:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Devitems
Devitems ht Mega
Elementor
Elementor elementor
Wordpress
Wordpress wordpress
Vendors & Products Devitems
Devitems ht Mega
Elementor
Elementor elementor
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Gutenberg blocks in all versions up to, and including, 3.0.0 due to insufficient input validation on user-supplied HTML tag names. This is due to the lack of a tag name whitelist allowing dangerous tags like 'script', 'iframe', and 'object' to be injected even though tag_escape() is used for sanitization. While some blocks use esc_html() for content, this can be bypassed using JavaScript encoding techniques (unquoted strings, backticks, String.fromCharCode()). This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title HT Mega – Absolute Addons For Elementor <= 3.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Tag Attribute Injection
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Devitems Ht Mega
Elementor Elementor
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:05:55.825Z

Reserved: 2025-11-13T18:55:09.559Z

Link: CVE-2025-13141

cve-icon Vulnrichment

Updated: 2025-11-21T14:53:39.799Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T09:15:46.543

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:15:36Z

Weaknesses