CVE-2024-0368

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpmudev:hustle:*:*:*:*:*:wordpress:*:*

History

11 Mar 2025, 16:51

Type Values Removed Values Added
First Time Wpmudev hustle
Wpmudev
CWE NVD-CWE-Other
CPE cpe:2.3:a:wpmudev:hustle:*:*:*:*:*:wordpress:*:*
References () https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api - () https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api - Product
References () https://developers.hubspot.com/docs/api/webhooks#scopes - () https://developers.hubspot.com/docs/api/webhooks#scopes - Product
References () https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13 - () https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13 - Product
References () https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php - () https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve - Third Party Advisory

21 Nov 2024, 08:46

Type Values Removed Values Added
Summary
  • (es) El complemento Hustle – Email Marketing, Lead Generation, Optins, Popups para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 7.8.3 incluida a través de claves API codificadas. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluida la PII.
References () https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api - () https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api -
References () https://developers.hubspot.com/docs/api/webhooks#scopes - () https://developers.hubspot.com/docs/api/webhooks#scopes -
References () https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13 - () https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13 -
References () https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php - () https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve -

13 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-13 16:15

Updated : 2025-03-11 16:51


NVD link : CVE-2024-0368

Mitre link : CVE-2024-0368

CVE.ORG link : CVE-2024-0368


JSON object : View

Products Affected

wpmudev

  • hustle