WordPress Popup Maker Vulnerability Affects Approximately +700,000 Sites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with many of the most popular contact kinds with features developed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around because 2021 it has actually experienced remarkable development and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called stored cross-site scripting (XSS). It’s called “saved” due to the fact that a harmful script is submitted to the website and stored on the server itself.

XSS vulnerabilities generally happen when an input fails to sanitize what is being uploaded. Anywhere that a user can input data is can become susceptible there is a lack of control over what can be uploaded.

This specific vulnerability can occur when a hacker can gain the qualifications of a user with a minimum of a contributor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and escape one of its shortcode qualities, which could enable users with a role as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author indicates that the exploit allows a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published an evidence of concept that shows how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this info send associated material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme consequences consisting of complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates given that the initial spot was provided for version 1.16.9, consisting of a more recent update that repairs a bug that was introduced with the security patch.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed need to consider updating the most recent variation.


Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS by means of Subscription Form

Included image by Best SMM Panel/Asier Romero