The Popup Builder by OptinMonster – WordPress Popups for Optins, Email Newsletters and Lead Generation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘campaign_id’ parameter in versions up to, and including, 2.16.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
16 Jul 2025, 15:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:optinmonster:optinmonster:*:*:*:*:*:wordpress:*:* | |
First Time |
Optinmonster optinmonster
Optinmonster |
|
References | () https://plugins.trac.wordpress.org/browser/optinmonster/tags/2.16.0/OMAPI/Elementor/Widget.php#L532 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3087905/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b4dfeb49-38d3-495d-af96-d67a29b339fa?source=cve - Third Party Advisory | |
CWE | CWE-79 |
Information
Published : 2024-05-25 06:15
Updated : 2025-07-16 15:56
NVD link : CVE-2024-4045
Mitre link : CVE-2024-4045
CVE.ORG link : CVE-2024-4045
JSON object : View
Products Affected
optinmonster
- optinmonster
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')