WordPress Popup Maker Vulnerability Impacts As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with many of the most popular contact forms with features designed to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around given that 2021 it has actually experienced remarkable development and made over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “saved” since a destructive script is published to the site and stored on the server itself.

XSS vulnerabilities typically occur when an input fails to sanitize what is being published. Anywhere that a user can input data is can become vulnerable there is a lack of control over what can be published.

This particular vulnerability can take place when a hacker can gain the credentials of a user with a minimum of a factor level of gain access to starts the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and get away one of its shortcode characteristics, which might permit users with a function as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the make use of enables an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of concept that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this information send related material, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the kind”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe effects including full site takeover, user data exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the original patch was released for version 1.16.9, consisting of a more recent upgrade that repairs a bug that was introduced with the security spot.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up must think about updating the latest variation.

Citations

Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Kept XSS through Membership Kind

Featured image by Best SMM Panel/Asier Romero