WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with a lot of the most popular contact kinds with functions created to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has actually only been around since 2021 it has experienced extraordinary development and earned over 4,000 first-class evaluations.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “stored” because a malicious script is published to the website and saved on the server itself.

XSS vulnerabilities normally occur when an input stops working to sterilize what is being submitted. Anywhere that a user can input data is can become susceptible there is a lack of control over what can be published.

This particular vulnerability can occur when a hacker can acquire the credentials of a user with a minimum of a factor level of gain access to starts the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin before 1.16.9 does not validate and get away one of its shortcode qualities, which could permit users with a role as low as contributor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author indicates that the make use of permits an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published a proof of principle that shows how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this info send out associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and sending the form”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have extreme effects consisting of complete website takeover, user information exposure and the planting of Trojan horse programs.

There have actually been subsequent updates since the initial patch was released for version 1.16.9, including a more recent update that repairs a bug that was presented with the security spot.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to think about updating the most recent variation.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS via Subscription Kind

Included image by SMM Panel/Asier Romero