WordPress Popup Maker Vulnerability Affects As Much As +700,000 Sites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with a lot of the most popular contact kinds with functions developed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications related to lead generation.

Although the plugin has actually just been around because 2021 it has actually experienced remarkable development and earned over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” since a destructive script is published to the website and stored on the server itself.

XSS vulnerabilities usually occur when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can happen when a hacker can acquire the credentials of a user with a minimum of a factor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and leave one of its shortcode qualities, which might enable users with a function as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author shows that the exploit permits an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released an evidence of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this information send out related material, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have serious consequences consisting of complete site takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates because the initial patch was issued for variation 1.16.9, including a newer update that repairs a bug that was presented with the security spot.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed must think about updating the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS by means of Subscription Kind

Included image by Best SMM Panel/Asier Romero