WordPress Popup Maker Vulnerability Affects Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database provided an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin incorporates with many of the most popular contact forms with functions developed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications associated to lead generation.

Although the plugin has only been around given that 2021 it has actually experienced phenomenal development and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “saved” since a destructive script is submitted to the website and stored on the server itself.

XSS vulnerabilities normally occur when an input fails to sanitize what is being published. Anywhere that a user can input information is can end up being vulnerable there is a lack of control over what can be uploaded.

This specific vulnerability can occur when a hacker can acquire the credentials of a user with a minimum of a contributor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database describes the reason for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and leave among its shortcode qualities, which could enable users with a function as low as factor to carry out Stored Cross-Site Scripting attacks.”

A main changelog released by the plugin author suggests that the exploit permits an individual with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of concept that shows how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about associated content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this details send out associated content, discounts and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be triggered when previewing/viewing the post/page and sending the kind”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have severe repercussions consisting of complete site takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates given that the original patch was issued for variation 1.16.9, including a newer upgrade that fixes a bug that was introduced with the security spot.

The most present version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up should think about upgrading the current version.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Check Out the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS by means of Membership Form

Included image by Best SMM Panel/Asier Romero