WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with a lot of the most popular contact kinds with features designed to drive conversions in WooCommerce shops, email newsletter signups and other popular applications related to lead generation.

Although the plugin has actually just been around because 2021 it has actually experienced remarkable development and made over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” because a destructive script is published to the site and stored on the server itself.

XSS vulnerabilities generally happen when an input fails to sanitize what is being submitted. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be published.

This specific vulnerability can occur when a hacker can acquire the qualifications of a user with at least a contributor level of access initiates the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and escape among its shortcode characteristics, which could permit users with a role as low as factor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author suggests that the exploit permits a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published an evidence of concept that demonstrates how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this info send associated content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have serious consequences including complete website takeover, user information direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates considering that the initial patch was released for variation 1.16.9, consisting of a newer upgrade that repairs a bug that was presented with the security spot.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up should consider updating the latest variation.

Citations

Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Kept XSS via Membership Form

Featured image by Best SMM Panel/Asier Romero