WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin integrates with much of the most popular contact kinds with functions designed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around because 2021 it has actually experienced phenomenal development and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “saved” since a destructive script is published to the website and saved on the server itself.

XSS vulnerabilities normally take place when an input stops working to sanitize what is being published. Anywhere that a user can input information is can end up being vulnerable there is a lack of control over what can be uploaded.

This particular vulnerability can occur when a hacker can acquire the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not validate and leave among its shortcode qualities, which might allow users with a function as low as factor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author indicates that the make use of permits an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published an evidence of idea that demonstrates how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about related content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this information send out related material, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe consequences consisting of full website takeover, user data exposure and the planting of Trojan horse programs.

There have actually been subsequent updates since the initial patch was issued for variation 1.16.9, including a more recent update that repairs a bug that was introduced with the security patch.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to consider upgrading the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS by means of Subscription Form

Featured image by Best SMM Panel/Asier Romero