First published: Wed Mar 13 2024(Updated: )
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.8.3 via hardcoded API Keys. This makes it possible for unauthenticated attackers to extract sensitive data including PII.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hustle | <7.8.4 | |
Hustle | <=7.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0368 is rated high due to its potential for exposing sensitive information, including personally identifiable information (PII).
To fix CVE-2024-0368, update the Hustle plugin to version 7.8.4 or later to remove the hardcoded API keys.
All users of the Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress up to and including version 7.8.3 are affected by CVE-2024-0368.
The vulnerability allows unauthenticated attackers to extract sensitive data, leading to potential data breaches.
No, CVE-2024-0368 can be exploited by unauthenticated attackers, making it particularly dangerous.