Description
The PopupKit plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.2.0. This is due to the plugin not properly verifying that a user is authorized to access the /popup/logs REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and delete analytics data including device types, browser information, countries, referrer URLs, and campaign metrics.
Problem types
Product status
* (semver)
Timeline
| 2026-02-03: | Vendor Notified |
| 2026-02-09: | Disclosed |
Credits
Dmitrii Ignatyev
References
www.wordfence.com/...-f065-4065-9ea5-bb86d24e09ab?source=cve
plugins.trac.wordpress.org/....2.0/includes/Routes/Popup.php
plugins.trac.wordpress.org/....2.0/includes/Routes/Popup.php
plugins.trac.wordpress.org/....2.0/includes/Routes/Popup.php
research.cleantalk.org/cve-2025-14895
plugins.trac.wordpress.org/...runk/includes/Routes/Popup.php