WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with much of the most popular contact kinds with functions designed to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around given that 2021 it has actually experienced incredible development and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “kept” due to the fact that a malicious script is uploaded to the website and kept on the server itself.

XSS vulnerabilities generally occur when an input fails to sanitize what is being published. Anywhere that a user can input data is can become vulnerable there is a lack of control over what can be submitted.

This particular vulnerability can occur when a hacker can acquire the credentials of a user with at least a factor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not validate and escape among its shortcode attributes, which might permit users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author indicates that the exploit enables a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released an evidence of principle that demonstrates how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this information send associated material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the kind”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have severe effects including full site takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates because the initial patch was released for version 1.16.9, including a more recent update that fixes a bug that was presented with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up ought to consider updating the latest variation.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS by means of Subscription Type

Featured image by SMM Panel/Asier Romero