WordPress Popup Maker Vulnerability Impacts Up To +700,000 Sites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with much of the most popular contact kinds with functions created to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around considering that 2021 it has experienced phenomenal development and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “kept” because a harmful script is submitted to the website and saved on the server itself.

XSS vulnerabilities generally take place when an input fails to sterilize what is being uploaded. Anywhere that a user can input information is can become susceptible there is an absence of control over what can be published.

This particular vulnerability can occur when a hacker can gain the credentials of a user with a minimum of a factor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database explains the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and get away one of its shortcode attributes, which might allow users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author indicates that the make use of enables a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released a proof of concept that shows how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this details send associated material, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have extreme consequences including full website takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates since the initial patch was issued for version 1.16.9, including a newer upgrade that fixes a bug that was presented with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed ought to consider updating the latest variation.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS via Membership Form

Featured image by SMM Panel/Asier Romero