WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is set up in over 700,000 sites.

The Popup Maker plugin incorporates with much of the most popular contact types with features created to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually only been around because 2021 it has experienced sensational growth and earned over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “kept” because a destructive script is submitted to the site and stored on the server itself.

XSS vulnerabilities usually happen when an input fails to sterilize what is being submitted. Anywhere that a user can input data is can end up being vulnerable there is an absence of control over what can be submitted.

This particular vulnerability can occur when a hacker can acquire the qualifications of a user with a minimum of a factor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database explains the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not validate and escape one of its shortcode characteristics, which could permit users with a role as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author indicates that the make use of allows a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability enabling contributors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of principle that demonstrates how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we utilize this information send out related content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and sending the type”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have serious repercussions consisting of full website takeover, user information exposure and the planting of Trojan horse programs.

There have been subsequent updates because the initial patch was released for variation 1.16.9, consisting of a more recent update that repairs a bug that was presented with the security patch.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed must consider upgrading the latest version.

Citations

Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Kept XSS through Subscription Form

Featured image by SMM Panel/Asier Romero