WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin integrates with many of the most popular contact forms with features created to drive conversions in WooCommerce shops, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around considering that 2021 it has experienced remarkable development and made over 4,000 first-class reviews.

Popup Maker Vulnerability

The vulnerability affecting this plugin is called kept cross-site scripting (XSS). It’s called “stored” because a destructive script is published to the website and saved on the server itself.

XSS vulnerabilities typically occur when an input stops working to sterilize what is being published. Anywhere that a user can input information is can end up being susceptible there is an absence of control over what can be uploaded.

This particular vulnerability can take place when a hacker can gain the credentials of a user with a minimum of a contributor level of access initiates the attack.

The U.S. Federal Government National Vulnerability Database describes the factor for the vulnerability and how an attack can happen:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and escape among its shortcode characteristics, which could enable users with a function as low as factor to perform Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the exploit permits an individual with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released a proof of idea that demonstrates how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this details send associated content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme effects including complete site takeover, user data exposure and the planting of Trojan horse programs.

There have been subsequent updates because the initial patch was provided for variation 1.16.9, including a newer update that repairs a bug that was presented with the security patch.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin set up must consider updating the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS via Subscription Type

Featured image by Best SMM Panel/Asier Romero