WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with a lot of the most popular contact types with functions created to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around since 2021 it has experienced sensational growth and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “saved” due to the fact that a destructive script is uploaded to the site and stored on the server itself.

XSS vulnerabilities typically occur when an input stops working to sanitize what is being published. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can take place when a hacker can get the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and leave one of its shortcode attributes, which might permit users with a function as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the exploit allows a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of concept that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this details send out related content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the kind”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme repercussions including full site takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates considering that the original patch was provided for version 1.16.9, including a more recent upgrade that fixes a bug that was presented with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed need to consider upgrading the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS by means of Subscription Form

Included image by SMM Panel/Asier Romero