WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with a number of the most popular contact forms with features created to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around considering that 2021 it has actually experienced phenomenal growth and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “saved” due to the fact that a malicious script is published to the site and saved on the server itself.

XSS vulnerabilities typically take place when an input stops working to sanitize what is being submitted. Anywhere that a user can input information is can end up being susceptible there is a lack of control over what can be uploaded.

This specific vulnerability can take place when a hacker can acquire the credentials of a user with a minimum of a factor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database explains the reason for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and escape one of its shortcode qualities, which might enable users with a role as low as factor to carry out Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author shows that the exploit allows a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published a proof of concept that demonstrates how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about associated material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this information send related content, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have serious repercussions including complete website takeover, user data direct exposure and the planting of Trojan horse programs.

There have actually been subsequent updates since the initial spot was released for variation 1.16.9, consisting of a more recent update that repairs a bug that was introduced with the security spot.

The most existing version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up ought to think about updating the most recent version.

Citations

Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Detail

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Stored XSS via Subscription Form

Featured image by Best SMM Panel/Asier Romero