Impact
The HT Mega Addons for Elementor plugin for WordPress is vulnerable to stored cross‑site scripting through its Gutenberg blocks. The flaw stems from a missing whitelist for user‑supplied HTML tag names, allowing dangerous tags such as script, iframe, and object to be injected. Although tag_escape() is used, the lack of a tag name filter permits these tags to survive sanitisation, and the use of esc_html() for block content can be bypassed with JavaScript encoding techniques like unquoted strings, backticks, or String.fromCharCode(). Consequently, an authenticated user with contributor level access or higher can inject arbitrary web scripts that execute whenever any visitor loads the affected page.
Affected Systems
WordPress sites that have installed the HT Mega Addons for Elementor – Elementor Widgets & Template Builder plugin from devitemsllc. All released versions up to and including version 3.0.0 are affected.
Risk and Exploitability
The vulnerability receives a CVSS score of 6.4, indicating moderate severity, and an EPSS score of less than 1%, suggesting a low probability of immediate exploitation. It is not listed in the CISA KEV catalog. Because the attacker must be authenticated with contributor or greater privileges, the attack vector is limited to authenticated users within a WordPress installation that has the vulnerable plugin enabled. Successful exploitation allows arbitrary JavaScript execution, enabling session hijacking, defacement, or credential theft for any user who views a page containing the injected content.
OpenCVE Enrichment