WordPress Popup Maker Vulnerability Affects Up To +700,000 Sites

Posted by

The U.S. federal government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with much of the most popular contact forms with functions created to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has just been around because 2021 it has actually experienced phenomenal growth and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “kept” since a harmful script is submitted to the website and stored on the server itself.

XSS vulnerabilities usually occur when an input stops working to sterilize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is an absence of control over what can be published.

This particular vulnerability can occur when a hacker can acquire the qualifications of a user with a minimum of a contributor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and escape one of its shortcode characteristics, which might enable users with a role as low as factor to carry out Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author shows that the make use of permits an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published an evidence of idea that demonstrates how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this details send out related content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme effects including complete website takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates because the original patch was released for version 1.16.9, including a more recent upgrade that repairs a bug that was presented with the security spot.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to consider upgrading the current variation.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Kept XSS by means of Membership Type

Included image by Best SMM Panel/Asier Romero