WordPress Popup Maker Vulnerability Affects As Much As +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 sites.

The Popup Maker plugin incorporates with much of the most popular contact forms with features created to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications related to lead generation.

Although the plugin has just been around given that 2021 it has experienced remarkable development and earned over 4,000 luxury reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “stored” because a malicious script is uploaded to the site and saved on the server itself.

XSS vulnerabilities normally take place when an input stops working to sterilize what is being published. Anywhere that a user can input information is can become vulnerable there is a lack of control over what can be uploaded.

This specific vulnerability can occur when a hacker can acquire the qualifications of a user with a minimum of a contributor level of access starts the attack.

The U.S. Federal Government National Vulnerability Database explains the factor for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin before 1.16.9 does not verify and escape one of its shortcode qualities, which might allow users with a role as low as contributor to carry out Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author shows that the make use of permits a person with contributor level access to run JavaScript.

The Popup Maker Plugin changelog for version V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released a proof of idea that shows how the exploit works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Call” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Notify me about related content and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you choose in above we use this info send related content, discount rates and other special offers.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and submitting the type”

While there is no description of how bad the make use of can be, in general, Stored XSS vulnerabilities can have extreme consequences consisting of full website takeover, user information exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the original spot was released for variation 1.16.9, including a more recent update that repairs a bug that was introduced with the security patch.

The most current version of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin installed need to think about updating the latest variation.


Read the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS through Membership Kind

Included image by SMM Panel/Asier Romero