WordPress Popup Maker Vulnerability Affects Approximately +700,000 Sites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin incorporates with a number of the most popular contact kinds with functions developed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around because 2021 it has experienced remarkable development and earned over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “stored” since a destructive script is published to the website and kept on the server itself.

XSS vulnerabilities usually take place when an input stops working to sanitize what is being published. Anywhere that a user can input data is can end up being vulnerable there is a lack of control over what can be published.

This particular vulnerability can occur when a hacker can gain the qualifications of a user with at least a factor level of access initiates the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin before 1.16.9 does not confirm and get away one of its shortcode qualities, which might permit users with a role as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author shows that the exploit allows an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of idea that demonstrates how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this information send out related content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and sending the type”

While there is no description of how bad the exploit can be, in basic, Stored XSS vulnerabilities can have extreme effects consisting of full website takeover, user information direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates because the initial spot was issued for version 1.16.9, consisting of a more recent upgrade that fixes a bug that was presented with the security spot.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed need to think about upgrading the current version.

Citations

Read the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Saved XSS by means of Subscription Type

Included image by SMM Panel/Asier Romero