WordPress Plugin Bug Hits Sites, Allows Malicious Redirect

November 1, 2021

A serious bug found as CVE-2021-39341 in the OptinMonster plugin allows unauthorized API access and disclosure of sensitive information on about one million WordPress pages.

The OptinMonster (a popular WordPress plugin used to create beautiful opt-in forms that help website owners convert visitors to subscribers/customers) flaw was discovered by Chloe Chamberland.

They claim that while OptinMonster’s power relies on API endpoints that provides space for seamless integration and a streamlined design process, the implementation of these endpoints is not always safe, as one of the endpoints (/wp-json/omapp/v1/support) could disclose data such as the full path of the site on the server, API keys for requests on the sites, and more.

With the API in the hands of an attacker, he could make changes to the OptinMonster accounts or create malicious JavaScript snippets on the website.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn