WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin incorporates with a lot of the most popular contact types with features created to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has just been around considering that 2021 it has actually experienced phenomenal growth and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called stored cross-site scripting (XSS). It’s called “stored” because a malicious script is submitted to the site and stored on the server itself.

XSS vulnerabilities generally happen when an input stops working to sterilize what is being submitted. Anywhere that a user can input data is can become susceptible there is an absence of control over what can be uploaded.

This specific vulnerability can happen when a hacker can acquire the qualifications of a user with at least a factor level of access initiates the attack.

The U.S. Government National Vulnerability Database explains the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and escape among its shortcode attributes, which could enable users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author shows that the exploit allows an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this information send out associated content, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have severe repercussions including complete website takeover, user information direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates because the original spot was released for variation 1.16.9, including a more recent upgrade that repairs a bug that was introduced with the security patch.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up must think about upgrading the current version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS by means of Membership Type

Included image by Best SMM Panel/Asier Romero