Server-Side Request Forgery Vulnerability in WowOptin Popup Maker Plugin for WordPress
CVE-2026-4302

7.2HIGH

What is CVE-2026-4302?

The WowOptin: Next-Gen Popup Maker plugin for WordPress contains a Server-Side Request Forgery vulnerability in its publicly accessible REST API endpoint. Specifically, the endpoint passes user-supplied URLs directly to wp_remote_get() and wp_remote_post() within the Webhook::add_subscriber() method without proper URL validation. This oversight allows unauthenticated attackers to exploit the vulnerability and make web requests to arbitrary locations, potentially querying and modifying sensitive information from internal services. The lack of restriction in the permission_callback further exacerbates the risk.

Affected Version(s)

WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation 0 <= 1.4.29

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Itthidej Aramsri
.