Description
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.1 via the 'get_post_data' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including the content of private, password-protected, and draft posts and pages.
Published: 2025-07-31
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Patch Now
AI Analysis

Impact

The HT Mega – Absolute Addons For Elementor plugin contains a flaw in the get_post_data function that allows an attacker with author or higher privileges to retrieve the full content of private, password‑protected, and draft posts and pages. This results in the disclosure of sensitive information that is intended to remain hidden from unauthenticated users. The weakness is an improper access control issue, classified as CWE‑285, where restricted data is accessible to users who should not have such visibility.

Affected Systems

The vulnerability affects the devitemsllc HT Mega Addons for Elementor plugin for WordPress, for any version up to and including 2.9.1. Sites that have installed 2.9.1 or an earlier version are at risk. No other versions are currently listed as affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate risk level, and the EPSS figure of less than 1% shows that the likelihood of exploitation is very low in the wild. The vulnerability is not yet part of CISA’s KEV catalog. Since the attack requires an authenticated author‑level account, the threat is largely internal; it would be unlikely to succeed from an external source without first compromising credentials.

Generated by OpenCVE AI on April 21, 2026 at 19:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the HT Mega Addons for Elementor plugin to the latest available version that eliminates the vulnerable get_post_data function.
  • If an upgrade is not feasible, disable or delete the plugin to remove the exposure.
  • Review WordPress user roles and limit author‑level access to trusted users, enforcing proper access control so that only authorized personnel can view private, password‑protected, and draft content.

Generated by OpenCVE AI on April 21, 2026 at 19:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23263 The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.1 via the 'get_post_data' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including the content of private, password-protected, and draft posts and pages.
History

Wed, 13 Aug 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Hasthemes
Hasthemes ht Mega
CPEs cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*
Vendors & Products Hasthemes
Hasthemes ht Mega

Thu, 31 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Elementor
Elementor elementor
Wordpress
Wordpress wordpress
Vendors & Products Elementor
Elementor elementor
Wordpress
Wordpress wordpress

Thu, 31 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 31 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
Description The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.1 via the 'get_post_data' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including the content of private, password-protected, and draft posts and pages.
Title HT Mega – Absolute Addons For Elementor <= 2.9.1 - Authenticated (Author+) Sensitive Information Exposure
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Elementor Elementor
Hasthemes Ht Mega
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:01.120Z

Reserved: 2025-07-30T22:55:56.638Z

Link: CVE-2025-8401

cve-icon Vulnrichment

Updated: 2025-07-31T14:09:23.759Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-31T12:15:27.437

Modified: 2025-08-13T19:31:59.007

Link: CVE-2025-8401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:45:16Z

Weaknesses