WordPress Popup Maker Vulnerability Impacts As Much As +700,000 Websites

Posted by

The U.S. government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was discovered in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 websites.

The Popup Maker plugin integrates with much of the most popular contact forms with features created to drive conversions in WooCommerce stores, e-mail newsletter signups and other popular applications associated to lead generation.

Although the plugin has actually just been around because 2021 it has actually experienced phenomenal development and earned over 4,000 luxury evaluations.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called kept cross-site scripting (XSS). It’s called “kept” since a destructive script is uploaded to the website and saved on the server itself.

XSS vulnerabilities normally take place when an input stops working to sanitize what is being published. Anywhere that a user can input information is can become vulnerable there is an absence of control over what can be published.

This specific vulnerability can occur when a hacker can gain the credentials of a user with at least a contributor level of gain access to initiates the attack.

The U.S. Government National Vulnerability Database describes the factor for the vulnerability and how an attack can take place:

“The Popup Maker WordPress plugin prior to 1.16.9 does not confirm and get away among its shortcode attributes, which might allow users with a role as low as factor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author shows that the exploit allows a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability permitting factors to run unfiltered JavaScript.”

Security company WPScan (owned by Automattic) released an evidence of concept that demonstrates how the make use of works.

“As a factor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Inform me about associated material and special offers.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you opt in above we utilize this information send out associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be set off when previewing/viewing the post/page and submitting the form”

While there is no description of how bad the make use of can be, in basic, Stored XSS vulnerabilities can have serious consequences consisting of full site takeover, user data direct exposure and the planting of Trojan horse programs.

There have been subsequent updates considering that the initial spot was provided for version 1.16.9, including a more recent upgrade that repairs a bug that was presented with the security spot.

The most existing variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up should consider updating the most recent version.


Read the U.S. Federal Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Contributor+ Saved XSS via Membership Type

Included image by SMM Panel/Asier Romero