WordPress Popup Maker Vulnerability Impacts Approximately +700,000 Sites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with much of the most popular contact kinds with features created to drive conversions in WooCommerce stores, email newsletter signups and other popular applications related to lead generation.

Although the plugin has actually only been around because 2021 it has experienced sensational development and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “kept” because a malicious script is uploaded to the site and stored on the server itself.

XSS vulnerabilities usually take place when an input fails to sterilize what is being uploaded. Anywhere that a user can input data is can become vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can take place when a hacker can gain the qualifications of a user with at least a contributor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and get away one of its shortcode attributes, which could permit users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the exploit allows a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published a proof of concept that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this details send associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and submitting the kind”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have extreme repercussions including complete site takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the initial patch was provided for variation 1.16.9, consisting of a more recent update that repairs a bug that was introduced with the security patch.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up should think about updating the current version.


Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS through Subscription Type

Included image by Best SMM Panel/Asier Romero