CVE-2023-37999

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to escalate privileges in the HT Mega WordPress plugin. Attackers can gain administrative access to affected WordPress sites without requiring any credentials. All WordPress sites running HT Mega versions up to 2.2.0 are affected.

💻 Affected Systems

Products:
  • HT Mega - Absolute Addons For Elementor (WordPress plugin)
Versions: All versions up to and including 2.2.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with HT Mega plugin enabled. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain full administrative control, can install backdoors, steal data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers gain administrative access to compromise the WordPress site, potentially leading to data theft, malware installation, or site defacement.

🟢

If Mitigated

With proper network segmentation and monitoring, impact could be limited to the affected WordPress instance only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and is straightforward. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/ht-mega-for-elementor/wordpress-ht-mega-absolute-addons-for-elementor-plugin-2-2-0-unauthenticated-privilege-escalation-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find HT Mega plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 2.2.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable HT Mega Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ht-mega

Restrict Access to WordPress Admin

linux

Limit access to WordPress admin interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT

🧯 If You Can't Patch

  • Immediately disable the HT Mega plugin via WordPress admin or command line
  • Implement web application firewall (WAF) rules to block privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for HT Mega version. If version is 2.2.0 or lower, you are vulnerable.

Check Version:

wp plugin get ht-mega --field=version

Verify Fix Applied:

Verify HT Mega plugin version is 2.2.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user creation
  • Multiple failed login attempts followed by successful admin login from same IP
  • POST requests to wp-admin/admin-ajax.php with privilege escalation parameters

Network Indicators:

  • Unusual traffic to WordPress admin endpoints from external IPs
  • HTTP requests containing 'action=ht_mega_ajax' or similar HT Mega-specific parameters

SIEM Query:

source="wordpress.log" AND ("admin_user_created" OR "privilege_escalation" OR "ht_mega_ajax")

🔗 References

📤 Share & Export