WordPress Popup Maker Vulnerability Impacts Up To +700,000 Websites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with a lot of the most popular contact kinds with features developed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around given that 2021 it has experienced remarkable development and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “stored” due to the fact that a harmful script is uploaded to the website and saved on the server itself.

XSS vulnerabilities generally take place when an input stops working to sanitize what is being submitted. Anywhere that a user can input data is can become susceptible there is a lack of control over what can be published.

This particular vulnerability can occur when a hacker can acquire the qualifications of a user with at least a contributor level of gain access to starts the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and escape among its shortcode qualities, which might allow users with a role as low as factor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author shows that the make use of enables an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of concept that demonstrates how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about related content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this info send out related material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe effects consisting of full site takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the initial spot was provided for version 1.16.9, consisting of a more recent update that repairs a bug that was introduced with the security patch.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to think about upgrading the most recent version.


Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Saved XSS by means of Subscription Kind

Featured image by Best SMM Panel/Asier Romero