
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2022-36340) affects the MailOptin WordPress plugin versions 1.2.49.0 and below. It is an Unauthenticated Optin Campaign Cache Deletion vulnerability that allows unauthorized users to delete cached campaign data (CVE Details).
The vulnerability has a CVSS v3.1 base score of 5.3, indicating a medium severity level. It is characterized by network accessibility (AV:N), low attack complexity (AC:L), requires no privileges (PR:N), needs no user interaction (UI:N), affects only the local system (S:U), has no impact on confidentiality (C:N), low impact on integrity (I:L), and no impact on availability (A:N) (Wordfence).
The vulnerability allows unauthorized users to delete cached campaign data in the MailOptin plugin, potentially affecting the integrity of stored campaign information (Patchstack).
The vulnerability was addressed in versions after 1.2.49.0. Users should upgrade to the latest version of the MailOptin plugin. The changelog indicates that capability and nonce checks were added to optin cache clearing operations to prevent unauthorized access (WordPress Changelog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."