CVE-2024-2085

6.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to inject malicious scripts into web pages using the HT Mega plugin's widgets. The scripts execute whenever users visit the compromised pages, enabling session hijacking, defacement, or malware distribution. All WordPress sites using HT Mega plugin versions up to 2.4.6 are affected.

💻 Affected Systems

Products:
  • HT Mega - Absolute Addons For Elementor WordPress Plugin
Versions: All versions up to and including 2.4.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with Elementor page builder and the HT Mega plugin installed. Contributor role or higher needed for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, install backdoors, or completely compromise the WordPress site and potentially the underlying server.

🟠

Likely Case

Site defacement, cookie/session theft leading to account takeover, or injection of cryptocurrency miners/adware into visitor browsers.

🟢

If Mitigated

Limited to content manipulation within the affected widgets if proper user role management and content review processes are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has contributor-level credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.7 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3048999/ht-mega-for-elementor/trunk/includes/widgets/htmega_accordion.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'HT Mega - Absolute Addons For Elementor'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.4.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate ht-mega-for-elementor

User Role Restriction

all

Temporarily restrict contributor-level users from editing posts/pages

Use WordPress role management plugins or functions to modify capabilities

🧯 If You Can't Patch

  • Implement strict content review workflow for all contributor submissions
  • Install web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for HT Mega version. If version is 2.4.6 or lower, you are vulnerable.

Check Version:

wp plugin get ht-mega-for-elementor --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.4.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual post/page edits by contributor users
  • Script tags containing 'size' attribute in widget content

Network Indicators:

  • Unexpected JavaScript execution from widget content
  • External script loads from widget parameters

SIEM Query:

source="wordpress" AND ("htmega" OR "size attribute") AND ("script" OR "onclick" OR "javascript:")

🔗 References

📤 Share & Export