Plugin Vulnerability Hub
Plugin 4 known issues Latest disclosed Apr 22, 2024

WP Fusion Lite – Marketing Automation and CRM Integration for WordPress Vulnerabilities

Review known vulnerability records for the WordPress plugin WP Fusion Lite – Marketing Automation and CRM Integration for WordPress (`wp-fusion-lite`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2024-32796, CVE-2024-27972 and CVE-2021-34661, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
4
High or Critical
1
Patch Coverage
100%
Last Updated
Apr 30, 2024
Priority CVE Quick Links

Fast paths into WP Fusion Lite – Marketing Automation and CRM Integration for WordPress CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
4
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for WP Fusion Lite – Marketing Automation and CRM Integration for WordPress so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
4 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 1 high severity finding.
Recent CVEs
CVE-2024-32796, CVE-2024-27972 and CVE-2021-34661
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for WP Fusion Lite – Marketing Automation and CRM Integration for WordPress

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2024-32796
CVE-2024-32796: WP Fusion Lite – Marketing Automation and CRM Integration for WordPress <= 3.42.10 - Information Exposure

The WP Fusion Lite – Marketing Automation and CRM Integration for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.42.10 through publicly exposed log files. This makes it possible for unauthenticated attackers...

Published
Apr 22, 2024
Patched Release
3.43.0
Affected Versions
Versions up to 3.42.10
Next Step
Update to 3.43.0 or newer if supported.
Plugin High Patched: Yes CVE-2024-27972
CVE-2024-27972: WP Fusion Lite <= 3.41.24 - Authenticated (Contributor+) Remote Code Execution

The WP Fusion Lite – Marketing Automation and CRM Integration for WordPress plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.41.24. This makes it possible for authenticated attackers, with contributor-level access and above, to e...

Published
Mar 13, 2024
Patched Release
3.42.10
Affected Versions
Versions up to 3.41.24
Next Step
Update to 3.42.10 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-34661
CVE-2021-34661: WP Fusion Lite <= 3.37.18 – Cross-Site Request Forgery to Data Deletion

The WP Fusion Lite WordPress plugin is vulnerable to Cross-Site Request Forgery via the `show_logs_section` function found in the ~/includes/admin/logging/class-log-handler.php file which allows attackers to drop all logs for the plugin, in versions up to and including 3.37.18.

Published
Aug 06, 2021
Patched Release
3.37.30
Affected Versions
Versions up to 3.37.18
Next Step
Update to 3.37.30 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-34660
CVE-2021-34660: WP Fusion Lite <= 3.37.18 – Reflected Cross-Site Scripting

The WP Fusion Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the startdate parameter found in the ~/includes/admin/logging/class-log-table-list.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.37.18.

Published
Aug 06, 2021
Patched Release
3.37.30
Affected Versions
Versions up to 3.37.18
Next Step
Update to 3.37.30 or newer if supported.