
Cybersecurity researchers have helped patch several vulnerabilities in an extremely popular WordPress Plugins, which could have been exploited by any visitor to undertake a number of actions against affected Wordpress websites.
OptinMonster helps create sales campaigns on WordPress Sites without much effort. through the use of dialogs. Wordfence explains that the vast majority of the plugin’s functionality as well as the OptinMonster app site rely on the use of API endpoints.
The vulnerabilities, discovered by WordPress Security experts Wordfence, existed in the OptinMonster plugin that boasts of a user base of over a million websites.
The majority of the REST-API endpoints were insecurely implemented, making it possible for unauthenticated attackers to access many of the various endpoints on sites running a vulnerable version of the plugin
One of the vulnerable endpoints could have been exploited to leak sensitive data like the site’s full path on the server, along with the API key the website uses to make requests on the OptinMonster site.
With access to the API key, an attacker could make changes to any campaign associated with a site’s connected OptinMonster account and add malicious JavaScript that would execute anytime a campaign was displayed on the exploited site.
Although there aren’t reports of the vulnerabilities being exploited in the wild, the plugin developer has invalidated all API keys, forcing users to generate new ones. They’ve also patched all vulnerabilities and made changes to how changes are made to the campaigns.