8.2

CVE-2021-39341

Exploit

OptinMonster <= 2.6.4 - Unprotected REST-API Endpoints

The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.
Mögliche Gegenmaßnahme
Popup Builder & Popup Maker for WordPress – OptinMonster Email Marketing and Lead Generation: Update to version 2.6.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Popup Builder & Popup Maker for WordPress – OptinMonster Email Marketing and Lead Generation
Version *-2.6.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OptinmonsterOptinmonster SwPlatformwordpress Version <= 2.6.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 44.32% 0.975
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N
security@wordfence.com 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CWE-285 Improper Authorization

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

CWE-319 Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

CWE-863 Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.