WordPress Popup Maker Vulnerability Impacts Up To +700,000 Sites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with much of the most popular contact types with features created to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has just been around considering that 2021 it has actually experienced phenomenal development and made over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “kept” since a destructive script is published to the website and stored on the server itself.

XSS vulnerabilities normally take place when an input stops working to sterilize what is being uploaded. Anywhere that a user can input data is can end up being susceptible there is an absence of control over what can be submitted.

This specific vulnerability can take place when a hacker can get the qualifications of a user with a minimum of a contributor level of access initiates the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and leave one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author suggests that the make use of enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this info send related content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and sending the kind”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have severe effects consisting of complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates since the initial patch was released for variation 1.16.9, including a more recent update that repairs a bug that was presented with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up ought to think about updating the latest variation.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS by means of Subscription Type

Included image by SMM Panel/Asier Romero