Description

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hustle_module_converted' AJAX action in all versions up to, and including, 7.8.10.2. This makes it possible for unauthenticated attackers to forge conversion tracking events for any Hustle module, including draft modules that are never displayed to users, thereby manipulating marketing analytics and conversion statistics.

INFO

Published Date :

2026-04-07T23:25:26.728Z

Last Modified :

2026-04-08T18:20:10.441Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2026-2263 vulnerability.

Vendors Products
Wordpress
  • Wordpress
Wpmudev
  • Hustle – Email Marketing, Lead Generation, Optins, Popups

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact