WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with many of the most popular contact kinds with features created to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has just been around because 2021 it has actually experienced remarkable growth and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “kept” because a malicious script is uploaded to the website and saved on the server itself.

XSS vulnerabilities generally occur when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is a lack of control over what can be published.

This particular vulnerability can happen when a hacker can acquire the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Government National Vulnerability Database describes the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and get away one of its shortcode characteristics, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author indicates that the exploit enables an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published an evidence of concept that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this details send out related content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have extreme repercussions including full site takeover, user data exposure and the planting of Trojan horse programs.

There have actually been subsequent updates since the initial patch was released for version 1.16.9, consisting of a newer update that repairs a bug that was introduced with the security patch.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed ought to think about upgrading the current variation.


Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS through Membership Type

Included image by Best SMM Panel/Asier Romero