6 results (0.008 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

The Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘campaign_id’ parameter in versions up to, and including, 2.16.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento The Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro 'campaign_id' en versiones hasta la 2.16.1 incluida debido a una sanitización de entrada insuficiente y salida que se escapa. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. • https://plugins.trac.wordpress.org/browser/optinmonster/tags/2.16.0/OMAPI/Elementor/Widget.php#L532 https://plugins.trac.wordpress.org/changeset/3087905 https://www.wordfence.com/threat-intel/vulnerabilities/id/b4dfeb49-38d3-495d-af96-d67a29b339fa?source=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in OptinMonster Popup Builder Team OptinMonster.This issue affects OptinMonster: from n/a through 2.15.3. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en OptinMonster Popup Builder Team OptinMonster. Este problema afecta a OptinMonster: desde n/a hasta 2.15.3. The OptinMonster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.15.3. This is due to missing or incorrect nonce validation on the validate_please_connect_notice_dismiss() function. • https://patchstack.com/database/vulnerability/optinmonster/wordpress-popup-builder-by-optinmonster-plugin-2-15-3-cross-site-request-forgery-csrf-notice-dismissal-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Popup Builder by OptinMonster WordPress plugin before 2.12.2 does not ensure that the campaign to be loaded via some shortcodes is actually a campaign, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, like draft, private or even password protected ones. The OptinMonster plugin for WordPress is vulnerable to unauthorized access of data due to insufficient post type validation on the 'prepare_campaign' function in versions up to 2.12.1. This makes it possible for authenticated attackers with subscriber-level access, and above, to access potentially sensitive information due to lack of protections and information restrictions that let campaign information or even private post and content information to be leaked. • https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 1

The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4. El plugin OptinMonster de WordPress es vulnerable a una divulgación de información confidencial y a la actualización no autorizada de la configuración debido a una comprobación insuficiente de la autorización por medio de la función logged_in_or_has_api_key en el archivo ~/OMAPI/RestApi.php que puede ser usada para explotar una inyección de scripts web maliciosos en los sitios con el plugin instalado. Esto afecta a las versiones hasta 2.6.4 incluyéndola • https://plugins.trac.wordpress.org/browser/optinmonster/trunk/OMAPI/RestApi.php?rev=2606519#L1460 https://wordfence.com/vulnerability-advisories/#CVE-2021-39341 https://www.wordfence.com/blog/2021/10/1000000-sites-affected-by-optinmonster-vulnerabilities • CWE-285: Improper Authorization CWE-319: Cleartext Transmission of Sensitive Information CWE-863: Incorrect Authorization •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The OptinMonster WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient input validation in the load_previews function found in the ~/OMAPI/Output.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.6.0. El plugin OptinMonster de WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado debido a una comprobación de entrada insuficiente en la función load_previews encontrada en el archivo ~/OMAPI/Output.php que permite a atacantes inyectar scripts web arbitrarios, en versiones hasta la 2.6.0, incluyéndola • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2595758%40optinmonster&new=2595758%40optinmonster&sfp_email=&sfph_mail=#file2 https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39325 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •