WordPress Popup Maker Vulnerability Affects As Much As +700,000 Sites

Posted by

The U.S. federal government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with many of the most popular contact kinds with features created to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around since 2021 it has experienced incredible growth and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “saved” due to the fact that a malicious script is uploaded to the website and kept on the server itself.

XSS vulnerabilities usually take place when an input stops working to sterilize what is being uploaded. Anywhere that a user can input information is can become susceptible there is an absence of control over what can be uploaded.

This specific vulnerability can take place when a hacker can get the qualifications of a user with a minimum of a factor level of gain access to starts the attack.

The U.S. Government National Vulnerability Database explains the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and leave one of its shortcode qualities, which might allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author shows that the exploit enables an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released an evidence of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this info send out associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and sending the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have serious repercussions including full website takeover, user information direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates given that the original spot was issued for version 1.16.9, consisting of a more recent update that repairs a bug that was presented with the security spot.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed must consider upgrading the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Stored XSS by means of Subscription Kind

Featured image by Best SMM Panel/Asier Romero