WordPress Popup Maker Vulnerability Affects As Much As +700,000 Sites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with a number of the most popular contact forms with features developed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around given that 2021 it has actually experienced remarkable development and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “saved” because a malicious script is published to the website and kept on the server itself.

XSS vulnerabilities typically take place when an input fails to sterilize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is an absence of control over what can be submitted.

This particular vulnerability can take place when a hacker can gain the credentials of a user with a minimum of a contributor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not verify and leave among its shortcode attributes, which could allow users with a function as low as contributor to perform Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author suggests that the make use of permits an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released a proof of principle that shows how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this details send associated material, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have serious effects consisting of full website takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates given that the initial patch was issued for version 1.16.9, consisting of a newer update that fixes a bug that was presented with the security patch.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed should think about upgrading the latest version.


Read the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Kept XSS by means of Subscription Kind

Featured image by Best SMM Panel/Asier Romero