WordPress Popup Maker Vulnerability Impacts Up To +700,000 Sites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with a lot of the most popular contact kinds with features created to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around given that 2021 it has actually experienced incredible growth and made over 4,000 five-star evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” due to the fact that a malicious script is uploaded to the website and kept on the server itself.

XSS vulnerabilities usually happen when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can become vulnerable there is an absence of control over what can be uploaded.

This specific vulnerability can occur when a hacker can gain the credentials of a user with a minimum of a contributor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and leave one of its shortcode characteristics, which might permit users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author indicates that the exploit enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this information send related material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe consequences including complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates given that the original spot was released for variation 1.16.9, including a more recent update that repairs a bug that was presented with the security spot.

The most current variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed must consider updating the latest version.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS through Membership Kind

Included image by Best SMM Panel/Asier Romero