WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with a lot of the most popular contact types with functions created to drive conversions in WooCommerce stores, email newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around because 2021 it has actually experienced incredible development and made over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “stored” due to the fact that a harmful script is uploaded to the site and stored on the server itself.

XSS vulnerabilities typically occur when an input stops working to sanitize what is being submitted. Anywhere that a user can input data is can become susceptible there is an absence of control over what can be published.

This particular vulnerability can take place when a hacker can acquire the qualifications of a user with at least a factor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database describes the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and get away one of its shortcode characteristics, which might permit users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author indicates that the exploit allows a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published an evidence of idea that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this info send out associated content, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have extreme repercussions consisting of complete site takeover, user information exposure and the planting of Trojan horse programs.

There have been subsequent updates since the original patch was released for variation 1.16.9, consisting of a newer upgrade that repairs a bug that was introduced with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed need to think about updating the most recent version.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS via Subscription Type

Featured image by Best SMM Panel/Asier Romero