WordPress Popup Maker Vulnerability Affects Up To +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with much of the most popular contact kinds with functions designed to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around because 2021 it has actually experienced incredible development and earned over 4,000 five-star evaluations.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “saved” due to the fact that a destructive script is uploaded to the website and kept on the server itself.

XSS vulnerabilities usually happen when an input fails to sanitize what is being submitted. Anywhere that a user can input information is can become vulnerable there is a lack of control over what can be published.

This specific vulnerability can happen when a hacker can acquire the credentials of a user with a minimum of a contributor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and leave among its shortcode qualities, which might permit users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the make use of enables an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released an evidence of idea that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this info send out associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have severe consequences consisting of complete site takeover, user data exposure and the planting of Trojan horse programs.

There have actually been subsequent updates considering that the original spot was provided for variation 1.16.9, including a newer update that fixes a bug that was introduced with the security spot.

The most current variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up need to consider updating the most recent version.

Citations

Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS by means of Subscription Form

Featured image by Best SMM Panel/Asier Romero