WordPress Popup Maker Vulnerability Affects Up To +700,000 Websites

Posted by

The U.S. government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with many of the most popular contact forms with features designed to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has just been around considering that 2021 it has actually experienced extraordinary growth and made over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called stored cross-site scripting (XSS). It’s called “stored” since a malicious script is submitted to the site and saved on the server itself.

XSS vulnerabilities typically happen when an input fails to sterilize what is being uploaded. Anywhere that a user can input data is can become susceptible there is a lack of control over what can be uploaded.

This specific vulnerability can take place when a hacker can get the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database describes the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and get away one of its shortcode qualities, which could enable users with a role as low as contributor to carry out Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author shows that the make use of permits a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released a proof of principle that shows how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this details send associated material, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have severe effects including complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates since the initial spot was released for variation 1.16.9, consisting of a newer update that fixes a bug that was introduced with the security patch.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up should consider updating the latest variation.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS through Subscription Form

Included image by SMM Panel/Asier Romero