WordPress Popup Maker Vulnerability Affects Up To +700,000 Sites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 websites.

The Popup Maker plugin integrates with much of the most popular contact forms with features created to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around given that 2021 it has experienced phenomenal development and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “kept” because a malicious script is uploaded to the site and kept on the server itself.

XSS vulnerabilities generally take place when an input stops working to sterilize what is being submitted. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be published.

This particular vulnerability can occur when a hacker can gain the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and leave one of its shortcode characteristics, which could enable users with a role as low as contributor to carry out Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author indicates that the make use of enables an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published an evidence of idea that shows how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this details send out associated material, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and submitting the kind”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have serious consequences consisting of full website takeover, user data exposure and the planting of Trojan horse programs.

There have been subsequent updates since the initial patch was provided for version 1.16.9, including a more recent upgrade that repairs a bug that was presented with the security spot.

The most current variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed need to consider updating the latest variation.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS through Membership Type

Included image by Best SMM Panel/Asier Romero