WordPress Popup Maker Vulnerability Affects Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 websites.

The Popup Maker plugin incorporates with a number of the most popular contact types with features designed to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has only been around considering that 2021 it has actually experienced phenomenal growth and earned over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called saved cross-site scripting (XSS). It’s called “saved” since a harmful script is submitted to the site and kept on the server itself.

XSS vulnerabilities typically occur when an input stops working to sterilize what is being published. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be submitted.

This specific vulnerability can take place when a hacker can acquire the credentials of a user with a minimum of a contributor level of gain access to starts the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and escape among its shortcode attributes, which could allow users with a function as low as contributor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the make use of allows an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability enabling factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of idea that shows how the make use of works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about related content and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we use this information send out associated content, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe consequences including full website takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the original spot was issued for variation 1.16.9, consisting of a more recent upgrade that repairs a bug that was presented with the security spot.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up should think about upgrading the most recent variation.

Citations

Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS via Subscription Kind

Included image by SMM Panel/Asier Romero