CVE-2020-10195
WordPress vulnerability analysis and mitigation

Overview

The Popup Builder WordPress plugin before version 3.64.1 contained a vulnerability (CVE-2020-10195) that allowed information disclosure and settings modification. This vulnerability affected over 100,000 WordPress websites and was discovered in March 2020. The plugin, developed by Sygnoos, is designed for creating and managing promotional modal pop-ups for WordPress blogs and websites (SecurityWeek).

Technical details

The vulnerability has a CVSS v3.1 base score of 6.3 (Medium) with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L. The issue stems from insufficient security checks in admin-post actions within com/classes/Actions.php. The vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (NVD).

Impact

The vulnerability allows authenticated attackers with minimal (subscriber-level) permissions to modify plugin settings, export newsletter subscriber lists, and obtain sensitive system configuration information including webserver configuration and installed plugins. This could lead to in-scope privilege escalation and unauthorized access to plugin functionality (SecurityWeek).

Mitigation and workarounds

The vulnerability was patched in Popup Builder version 3.64.1, released on March 11, 2020. Site administrators are strongly advised to update to this version or later to protect against potential exploitation. The fix was released within a week of the vulnerability being reported to the developer (SecurityWeek).

Community reactions

While no malicious exploitation was detected in the wild, security researchers emphasized the serious potential impact of the vulnerability. As of the initial disclosure, approximately 33,000 users had updated to the patched version, leaving an estimated 66,000 sites still vulnerable (BleepingComputer).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-47552CRITICAL9.8
  • dzs-videogallery
NoNoJan 07, 2026
CVE-2025-46494HIGH7.1
  • widgetkit-pro
NoNoJan 07, 2026
CVE-2025-46434MEDIUM6.5
  • theplus_elementor_addon
NoYesJan 07, 2026
CVE-2025-14275MEDIUM6.4
  • jeg-elementor-kit
NoYesJan 08, 2026
CVE-2025-12640MEDIUM4.3
  • folders
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management