WordPress Popup Maker Vulnerability Impacts Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin integrates with many of the most popular contact kinds with functions developed to drive conversions in WooCommerce shops, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around because 2021 it has actually experienced incredible growth and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “saved” since a harmful script is uploaded to the website and kept on the server itself.

XSS vulnerabilities typically occur when an input stops working to sanitize what is being uploaded. Anywhere that a user can input data is can end up being vulnerable there is an absence of control over what can be uploaded.

This particular vulnerability can occur when a hacker can acquire the credentials of a user with a minimum of a factor level of gain access to initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and escape one of its shortcode attributes, which might enable users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author suggests that the exploit permits a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released an evidence of principle that demonstrates how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this details send related material, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the kind”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have extreme repercussions including complete website takeover, user information exposure and the planting of Trojan horse programs.

There have been subsequent updates because the initial patch was released for version 1.16.9, consisting of a newer update that fixes a bug that was introduced with the security spot.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up need to consider upgrading the most recent variation.


Read the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS by means of Membership Form

Included image by Best SMM Panel/Asier Romero