WordPress Plugin Bug Hits Sites, Allows Malicious Redirect

November 1, 2021

A serious bug found as CVE-2021-39341 in the OptinMonster plugin allows unauthorized API access and disclosure of sensitive information on about one million WordPress pages.

The OptinMonster (a popular WordPress plugin used to create beautiful opt-in forms that help website owners convert visitors to subscribers/customers) flaw was discovered by Chloe Chamberland.

They claim that while OptinMonster’s power relies on API endpoints that provides space for seamless integration and a streamlined design process, the implementation of these endpoints is not always safe, as one of the endpoints (/wp-json/omapp/v1/support) could disclose data such as the full path of the site on the server, API keys for requests on the sites, and more.

With the API in the hands of an attacker, he could make changes to the OptinMonster accounts or create malicious JavaScript snippets on the website.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

June 24, 2025 A new report from Okta shows that despite growing fears about identity theft, most more...

June 23, 2025 Canada’s cybersecurity agency and the U.S. Federal Bureau of Investigation have confirmed that a more...

June 12, 2025 A new vulnerability discovered in Microsoft Copilot has raised urgent concerns about the security more...

May 6, 2025 A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by more...

Jim Love

Jim is and author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn