CVE-2024-12599

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to inject malicious scripts into pages using the HT Mega plugin's Countdown widget. The scripts are stored and execute whenever users view the compromised pages, potentially stealing credentials or performing unauthorized actions. All WordPress sites using HT Mega plugin versions up to 2.8.1 are affected.

💻 Affected Systems

Products:
  • HT Mega – Absolute Addons For Elementor WordPress plugin
Versions: All versions up to and including 2.8.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor and HT Mega plugin installed. Contributor-level or higher user access needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users, potentially leading to complete site compromise.

🟠

Likely Case

Attackers with contributor access inject malicious scripts that steal user session cookies or credentials, leading to account takeover and limited site manipulation.

🟢

If Mitigated

With proper user access controls and content security policies, impact is limited to defacement or minor data leakage from affected pages only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with at least contributor privileges. Exploitation involves manipulating Countdown widget attributes in page/post editor.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.8.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3234495/ht-mega-for-elementor

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'HT Mega – Absolute Addons For Elementor'. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Restrict User Roles

all

Limit contributor and author roles to trusted users only, and review existing users with these permissions.

Content Security Policy

all

Implement CSP headers to restrict script execution sources and reduce XSS impact.

🧯 If You Can't Patch

  • Disable HT Mega plugin completely until patched
  • Remove contributor and author access for untrusted users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for HT Mega version. If version is 2.8.1 or lower, system is vulnerable.

Check Version:

wp plugin list --name='ht-mega-for-elementor' --field=version

Verify Fix Applied:

After updating, verify HT Mega plugin version shows 2.8.2 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to wp-admin/post.php with Countdown widget parameters
  • Multiple page edits by contributor-level users in short time

Network Indicators:

  • Unexpected script tags in page responses containing 'htmega-countdown' class or attributes

SIEM Query:

source="wordpress.log" AND ("htmega-countdown" OR "Countdown" AND "widget") AND status=200

🔗 References

📤 Share & Export