WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Websites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with a number of the most popular contact types with features developed to drive conversions in WooCommerce shops, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has just been around considering that 2021 it has actually experienced sensational growth and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “saved” due to the fact that a destructive script is submitted to the website and saved on the server itself.

XSS vulnerabilities generally happen when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is an absence of control over what can be submitted.

This specific vulnerability can occur when a hacker can acquire the qualifications of a user with a minimum of a factor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not validate and get away among its shortcode attributes, which might enable users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author suggests that the make use of enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of concept that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this details send related content, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have extreme repercussions consisting of complete site takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the original spot was released for version 1.16.9, including a more recent upgrade that fixes a bug that was introduced with the security spot.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed must think about updating the most recent version.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS through Subscription Form

Included image by Best SMM Panel/Asier Romero