WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin integrates with a number of the most popular contact forms with functions developed to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has actually only been around since 2021 it has experienced incredible development and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” due to the fact that a malicious script is uploaded to the site and stored on the server itself.

XSS vulnerabilities generally take place when an input stops working to sterilize what is being published. Anywhere that a user can input information is can end up being susceptible there is a lack of control over what can be uploaded.

This particular vulnerability can occur when a hacker can acquire the qualifications of a user with at least a factor level of access initiates the attack.

The U.S. Government National Vulnerability Database explains the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and get away one of its shortcode qualities, which might enable users with a function as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author shows that the make use of enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published an evidence of concept that shows how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about related content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this info send related material, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have severe consequences consisting of complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates given that the original patch was issued for variation 1.16.9, consisting of a more recent upgrade that fixes a bug that was introduced with the security patch.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up ought to consider updating the current version.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS through Membership Form

Included image by Best SMM Panel/Asier Romero