Description
The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.
Published: 2021-11-01
Score: 8.2 High
EPSS: 44.3% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update to version 2.6.5, or newer.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 31 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Optinmonster Optinmonster
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-03-31T17:45:22.682Z

Reserved: 2021-08-20T00:00:00.000Z

Link: CVE-2021-39341

cve-icon Vulnrichment

Updated: 2024-08-04T02:06:42.512Z

cve-icon NVD

Status : Modified

Published: 2021-11-01T21:15:07.863

Modified: 2024-11-21T06:19:16.893

Link: CVE-2021-39341

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses