WordPress Plugin Bug Hits Sites, Allows Malicious Redirect

November 1, 2021

A serious bug found as CVE-2021-39341 in the OptinMonster plugin allows unauthorized API access and disclosure of sensitive information on about one million WordPress pages.

The OptinMonster (a popular WordPress plugin used to create beautiful opt-in forms that help website owners convert visitors to subscribers/customers) flaw was discovered by Chloe Chamberland.

They claim that while OptinMonster’s power relies on API endpoints that provides space for seamless integration and a streamlined design process, the implementation of these endpoints is not always safe, as one of the endpoints (/wp-json/omapp/v1/support) could disclose data such as the full path of the site on the server, API keys for requests on the sites, and more.

With the API in the hands of an attacker, he could make changes to the OptinMonster accounts or create malicious JavaScript snippets on the website.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn