Description
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘marker_title’, 'notification_content', and 'stt_button_text' parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.3.
Published: 2025-03-20
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via contributor‑level plugin input
Action: Immediate Patch
AI Analysis

Impact

The HT Mega – Absolute Addons For Elementor plugin contains a stored XSS vulnerability that allows authenticated users with Contributor or higher access to inject arbitrary scripts through the marker_title, notification_content and stt_button_text parameters. When a victim opens a page containing the injected content, the stored script executes in the victim’s browser, enabling data theft, session hijacking, or defacement. The weakness is a classic case of insufficient input sanitization leading to CWE‑79.

Affected Systems

WordPress sites running the HT Mega – Absolute Addons For Elementor plugin by devitemsllc, all versions up to and including 2.8.3. The plugin adds widgets and templates to Elementor and is accessible via the WordPress administration interface.

Risk and Exploitability

The CVSS score of 6.4 classifies this as a moderate severity issue, but the EPSS score of less than 1 % indicates low likelihood of active exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to have authenticated Contributor access and to modify widget parameters within the plugin’s editor. Successful exploitation results in client‑side script execution on any user who views the affected page.

Generated by OpenCVE AI on April 21, 2026 at 21:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest HT Mega plugin version that removes the XSS vectors (any release newer than 2.8.3).
  • If an upgrade is unavailable, immediately revoke Contributor or higher roles from all users and remove the vulnerable widgets.
  • Configure WordPress to strip or encode user‑supplied HTML in widget content, for example by enforcing stricter sanitization or using a security plugin that blocks script tags.

Generated by OpenCVE AI on April 21, 2026 at 21:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6802 The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘marker_title’, 'notification_content', and 'stt_button_text' parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.3.
History

Wed, 26 Mar 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Hasthemes
Hasthemes ht Mega
CPEs cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*
Vendors & Products Hasthemes
Hasthemes ht Mega

Thu, 20 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘marker_title’, 'notification_content', and 'stt_button_text' parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.3.
Title HT Mega – Absolute Addons For Elementor <= 2.8.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Widgets
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Hasthemes Ht Mega
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:26.689Z

Reserved: 2025-02-28T23:31:37.947Z

Link: CVE-2025-1802

cve-icon Vulnrichment

Updated: 2025-03-20T13:12:50.357Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T12:15:14.413

Modified: 2025-03-26T18:22:17.850

Link: CVE-2025-1802

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses