WordPress Popup Maker Vulnerability Impacts As Much As +700,000 Sites

Posted by

The U.S. federal government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with many of the most popular contact kinds with functions developed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has actually only been around considering that 2021 it has actually experienced extraordinary development and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called stored cross-site scripting (XSS). It’s called “saved” because a harmful script is submitted to the website and kept on the server itself.

XSS vulnerabilities generally take place when an input fails to sterilize what is being submitted. Anywhere that a user can input data is can end up being vulnerable there is a lack of control over what can be published.

This particular vulnerability can take place when a hacker can acquire the credentials of a user with at least a factor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and get away one of its shortcode characteristics, which could permit users with a role as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author indicates that the exploit enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published an evidence of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about related material and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this details send out related content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have serious effects including complete website takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the initial spot was provided for version 1.16.9, including a newer update that fixes a bug that was introduced with the security patch.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up ought to consider updating the latest variation.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS via Membership Kind

Included image by Best SMM Panel/Asier Romero