Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4875 PoC — WordPress Plugin HT Mega–Absolute Addons For Elementor 安全漏洞

Source
Associated Vulnerability
Title:WordPress Plugin HT Mega–Absolute Addons For Elementor 安全漏洞 (CVE-2024-4875)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin HT Mega–Absolute Addons For Elementor 2.5.2及之前版本存在安全漏洞,该漏洞源于缺少功能检查,导致数据丢失。
Description
HT Mega – Absolute Addons For Elementor <= 2.5.2 - Missing Authorization to Options Update
Readme
# CVE-2024-4875
HT Mega – Absolute Addons For Elementor &lt;= 2.5.2 - Missing Authorization to Options Update

### Description:

The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration. But this is kind of pointless as you need a registered user to open registration but if you know of another value that can be set to true in the options this would enable it.

```
Severity: medium
CVE ID: CVE-2024-4875
CVSS Score: 4.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Plugin Slug: ht-mega-for-elementor
WPScan URL: https://www.wpscan.com/plugin/ht-mega-for-elementor
Reference URL: https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd3868a-d741-42b4-bc7f-6fb5d33bb71b
```
File Snapshot

[4.0K] /data/pocs/e911c45a56bd5eb05d7f979038c333d611d26741 ├── [5.3K] CVE-2024-4875.py └── [1.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.