vulnerability
WordPress Plugin: optinmonster: CVE-2023-0772: Authorization Bypass Through User-Controlled Key
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Mar 3, 2023 | May 15, 2025 | Jul 9, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Mar 3, 2023
Added
May 15, 2025
Modified
Jul 9, 2025
Description
The OptinMonster plugin for WordPress is vulnerable to unauthorized access of data due to insufficient post type validation on the 'prepare_campaign' function in versions up to 2.12.1. This makes it possible for authenticated attackers with subscriber-level access, and above, to access potentially sensitive information due to lack of protections and information restrictions that let campaign information or even private post and content information to be leaked.
Solution
optinmonster-plugin-cve-2023-0772
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.