WordPress Popup Maker Vulnerability Affects Approximately +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with many of the most popular contact types with features designed to drive conversions in WooCommerce shops, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around given that 2021 it has experienced extraordinary development and made over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “saved” due to the fact that a malicious script is submitted to the site and stored on the server itself.

XSS vulnerabilities normally take place when an input stops working to sterilize what is being uploaded. Anywhere that a user can input data is can become vulnerable there is a lack of control over what can be submitted.

This particular vulnerability can occur when a hacker can gain the credentials of a user with a minimum of a factor level of access initiates the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and leave one of its shortcode qualities, which could enable users with a function as low as factor to perform Stored Cross-Site Scripting attacks.”

A main changelog published by the plugin author indicates that the make use of allows an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of concept that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this details send related content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have serious repercussions consisting of complete site takeover, user data exposure and the planting of Trojan horse programs.

There have been subsequent updates since the original spot was provided for variation 1.16.9, including a more recent update that repairs a bug that was presented with the security patch.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up must consider upgrading the most recent version.

Citations

Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Stored XSS through Subscription Form

Featured image by SMM Panel/Asier Romero