WordPress Plugin Bug Hits Sites, Allows Malicious Redirect

November 1, 2021

A serious bug found as CVE-2021-39341 in the OptinMonster plugin allows unauthorized API access and disclosure of sensitive information on about one million WordPress pages.

The OptinMonster (a popular WordPress plugin used to create beautiful opt-in forms that help website owners convert visitors to subscribers/customers) flaw was discovered by Chloe Chamberland.

They claim that while OptinMonster’s power relies on API endpoints that provides space for seamless integration and a streamlined design process, the implementation of these endpoints is not always safe, as one of the endpoints (/wp-json/omapp/v1/support) could disclose data such as the full path of the site on the server, API keys for requests on the sites, and more.

With the API in the hands of an attacker, he could make changes to the OptinMonster accounts or create malicious JavaScript snippets on the website.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

February 23, 2026 Researchers say they’ve identified a new strain of Android malware that uses Google’s own Gemini AI model more...

February 23, 2026 Texas officials are warning about what could be the largest data breach in U.S. history, with notification more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn