5 results (0.016 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in OptinMonster Popup Builder Team OptinMonster.This issue affects OptinMonster: from n/a through 2.15.3. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en OptinMonster Popup Builder Team OptinMonster. Este problema afecta a OptinMonster: desde n/a hasta 2.15.3. The OptinMonster plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.15.3. This is due to missing or incorrect nonce validation on the validate_please_connect_notice_dismiss() function. • https://patchstack.com/database/vulnerability/optinmonster/wordpress-popup-builder-by-optinmonster-plugin-2-15-3-cross-site-request-forgery-csrf-notice-dismissal-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Popup Builder by OptinMonster WordPress plugin before 2.12.2 does not ensure that the campaign to be loaded via some shortcodes is actually a campaign, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, like draft, private or even password protected ones. The OptinMonster plugin for WordPress is vulnerable to unauthorized access of data due to insufficient post type validation on the 'prepare_campaign' function in versions up to 2.12.1. This makes it possible for authenticated attackers with subscriber-level access, and above, to access potentially sensitive information due to lack of protections and information restrictions that let campaign information or even private post and content information to be leaked. • https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 1

The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4. El plugin OptinMonster de WordPress es vulnerable a una divulgación de información confidencial y a la actualización no autorizada de la configuración debido a una comprobación insuficiente de la autorización por medio de la función logged_in_or_has_api_key en el archivo ~/OMAPI/RestApi.php que puede ser usada para explotar una inyección de scripts web maliciosos en los sitios con el plugin instalado. Esto afecta a las versiones hasta 2.6.4 incluyéndola • https://plugins.trac.wordpress.org/browser/optinmonster/trunk/OMAPI/RestApi.php?rev=2606519#L1460 https://wordfence.com/vulnerability-advisories/#CVE-2021-39341 https://www.wordfence.com/blog/2021/10/1000000-sites-affected-by-optinmonster-vulnerabilities • CWE-285: Improper Authorization CWE-319: Cleartext Transmission of Sensitive Information CWE-863: Incorrect Authorization •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The OptinMonster WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient input validation in the load_previews function found in the ~/OMAPI/Output.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.6.0. El plugin OptinMonster de WordPress es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado debido a una comprobación de entrada insuficiente en la función load_previews encontrada en el archivo ~/OMAPI/Output.php que permite a atacantes inyectar scripts web arbitrarios, en versiones hasta la 2.6.0, incluyéndola • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2595758%40optinmonster&new=2595758%40optinmonster&sfp_email=&sfph_mail=#file2 https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39325 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The optinmonster plugin before 1.1.4.6 for WordPress has incorrect access control for shortcodes because of a nonce leak. El plugin optinmonster versiones anteriores a 1.1.4.6 para WordPress, presenta un control de acceso incorrecto para los códigos cortos debido a una perdida de nonce. The OptinMonster plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.4.5 via the shortcode() function. This allows unauthenticated attackers to execute code on the server. • http://www.pritect.net/blog/optinmonster-1-1-4-6-security-vulnerability https://wordpress.org/plugins/optinmonster/#developers • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-863: Incorrect Authorization •