WordPress Popup Maker Vulnerability Impacts Up To +700,000 Websites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin integrates with much of the most popular contact kinds with functions designed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around since 2021 it has actually experienced incredible growth and earned over 4,000 first-class evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” due to the fact that a harmful script is submitted to the website and saved on the server itself.

XSS vulnerabilities typically take place when an input fails to sterilize what is being submitted. Anywhere that a user can input information is can become susceptible there is an absence of control over what can be uploaded.

This specific vulnerability can occur when a hacker can gain the qualifications of a user with at least a factor level of gain access to starts the attack.

The U.S. Federal Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and leave among its shortcode characteristics, which might enable users with a function as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author suggests that the exploit permits a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) published a proof of concept that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about related content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this details send related material, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have serious consequences including full site takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates since the original spot was issued for version 1.16.9, including a more recent update that fixes a bug that was introduced with the security patch.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to think about upgrading the latest variation.


Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS through Subscription Type

Featured image by Best SMM Panel/Asier Romero