Description

The PopupKit plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.2.0. This is due to the plugin not properly verifying that a user is authorized to access the /popup/logs REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete analytics data including device types, browser information, countries, referrer URLs, and campaign metrics.

INFO

Published Date :

2026-02-10T09:26:06.042Z

Last Modified :

2026-02-10T16:10:07.358Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2025-14895 vulnerability.

Vendors Products
Roxnor
  • Popup Builder With Gamification, Multi-step Popups, Page-level Targeting, And Woocommerce Triggers
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact