WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database issued an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin integrates with a number of the most popular contact types with functions developed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications related to lead generation.

Although the plugin has just been around because 2021 it has actually experienced remarkable development and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called saved cross-site scripting (XSS). It’s called “kept” since a harmful script is submitted to the site and kept on the server itself.

XSS vulnerabilities generally happen when an input fails to sanitize what is being published. Anywhere that a user can input information is can end up being vulnerable there is an absence of control over what can be published.

This specific vulnerability can happen when a hacker can gain the credentials of a user with at least a factor level of access initiates the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and get away one of its shortcode qualities, which might permit users with a function as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog released by the plugin author shows that the exploit permits a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) published an evidence of principle that shows how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Name” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we use this details send out associated material, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the kind”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have severe effects consisting of full site takeover, user information direct exposure and the planting of Trojan horse programs.

There have been subsequent updates given that the initial spot was provided for version 1.16.9, consisting of a more recent upgrade that fixes a bug that was presented with the security spot.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have actually the plugin installed need to consider updating the latest variation.


Check Out the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Saved XSS via Membership Type

Included image by Best SMM Panel/Asier Romero