WordPress Popup Maker Vulnerability Affects Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with many of the most popular contact kinds with features developed to drive conversions in WooCommerce shops, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around given that 2021 it has experienced extraordinary development and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” since a malicious script is uploaded to the website and saved on the server itself.

XSS vulnerabilities usually happen when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is a lack of control over what can be uploaded.

This specific vulnerability can happen when a hacker can gain the credentials of a user with at least a contributor level of gain access to initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and leave one of its shortcode characteristics, which could allow users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author indicates that the exploit allows an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published a proof of principle that demonstrates how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this information send associated material, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the form”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have severe consequences including complete site takeover, user data exposure and the planting of Trojan horse programs.

There have actually been subsequent updates given that the original patch was issued for variation 1.16.9, including a more recent upgrade that fixes a bug that was introduced with the security spot.

The most current variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up should think about upgrading the current variation.


Read the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Saved XSS by means of Subscription Type

Included image by Best SMM Panel/Asier Romero