
Cloud Vulnerability DB
A community-led vulnerabilities database
The Popup Builder plugin for WordPress contains a Sensitive Information Exposure vulnerability (CVE-2024-2541) affecting all versions up to and including 4.3.3. The vulnerability was discovered and disclosed on August 29, 2024. The affected component is the Subscribers Import feature, which impacts the WordPress plugin developed by Sygnoos (NVD).
The vulnerability allows unauthenticated attackers to extract sensitive data after an administrator has imported subscribers via a CSV file. The severity of this vulnerability has been assessed with different CVSS v3.1 scores: NIST rates it as HIGH with a base score of 7.5 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), while Wordfence assigns it a MEDIUM severity with a base score of 5.3 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) (NVD).
When exploited, this vulnerability can lead to the exposure of subscribers' personally identifiable information (PII), including first names, last names, email addresses, and potentially other sensitive data. The impact is particularly significant as it affects unauthenticated access to subscriber information that should be protected (NVD).
Users of the Popup Builder WordPress plugin should upgrade to a version newer than 4.3.3 as soon as possible to address this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."