WordPress Popup Maker Vulnerability Impacts Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 websites.

The Popup Maker plugin incorporates with a number of the most popular contact forms with functions developed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has just been around because 2021 it has experienced remarkable growth and made over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “kept” due to the fact that a destructive script is published to the website and stored on the server itself.

XSS vulnerabilities usually happen when an input stops working to sterilize what is being published. Anywhere that a user can input information is can become vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can happen when a hacker can get the qualifications of a user with at least a contributor level of gain access to starts the attack.

The U.S. Federal Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and leave among its shortcode qualities, which could allow users with a function as low as factor to perform Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author shows that the make use of allows an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published a proof of principle that demonstrates how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about associated material and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this info send related material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme consequences including full website takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates considering that the original spot was issued for variation 1.16.9, including a newer upgrade that repairs a bug that was presented with the security patch.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed should consider updating the current version.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS through Membership Kind

Included image by Best SMM Panel/Asier Romero

Leave a Reply

Your email address will not be published. Required fields are marked *