The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.
History

Mon, 31 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-03-31T17:45:22.682Z

Reserved: 2021-08-20T00:00:00.000Z

Link: CVE-2021-39341

cve-icon Vulnrichment

Updated: 2024-08-04T02:06:42.512Z

cve-icon NVD

Status : Modified

Published: 2021-11-01T21:15:07.863

Modified: 2024-11-21T06:19:16.893

Link: CVE-2021-39341

cve-icon Redhat

No data.