The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
References
Configurations
History
11 Mar 2025, 16:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpmudev:hustle:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Wpmudev hustle
Wpmudev |
|
References | () https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api - Product | |
References | () https://developers.hubspot.com/docs/api/webhooks#scopes - Product | |
References | () https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve - Third Party Advisory |
Information
Published : 2024-03-13 16:15
Updated : 2025-03-11 16:51
NVD link : CVE-2024-0368
Mitre link : CVE-2024-0368
CVE.ORG link : CVE-2024-0368
JSON object : View
Products Affected
wpmudev
- hustle
CWE