WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with many of the most popular contact kinds with functions created to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around considering that 2021 it has experienced remarkable growth and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “stored” since a harmful script is published to the site and kept on the server itself.

XSS vulnerabilities typically happen when an input stops working to sanitize what is being published. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can occur when a hacker can acquire the qualifications of a user with a minimum of a factor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database explains the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and leave among its shortcode attributes, which might allow users with a function as low as factor to perform Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author suggests that the exploit enables a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of principle that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this information send related content, discounts and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have serious effects including complete site takeover, user data exposure and the planting of Trojan horse programs.

There have been subsequent updates because the initial patch was issued for version 1.16.9, including a newer upgrade that repairs a bug that was introduced with the security patch.

The most current variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up must consider updating the current variation.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS via Subscription Kind

Featured image by SMM Panel/Asier Romero