WordPress Popup Maker Vulnerability Impacts Up To +700,000 Websites

Posted by

The U.S. federal government National Vulnerability Database released an advisory about a Stored Cross-Site Scripting vulnerability in the popular Popup Maker plugin for WordPress.

Popup Maker for WordPress

A vulnerability was found in the “Popup Maker– Popup for opt-ins, lead gen, & more” WordPress plugin which is installed in over 700,000 websites.

The Popup Maker plugin integrates with a number of the most popular contact forms with functions designed to drive conversions in WooCommerce stores, email newsletter signups and other popular applications related to lead generation.

Although the plugin has actually only been around since 2021 it has experienced phenomenal growth and made over 4,000 five-star reviews.

Popup Maker Vulnerability

The vulnerability impacting this plugin is called stored cross-site scripting (XSS). It’s called “stored” because a destructive script is submitted to the site and stored on the server itself.

XSS vulnerabilities typically occur when an input stops working to sterilize what is being published. Anywhere that a user can input data is can become vulnerable there is an absence of control over what can be uploaded.

This specific vulnerability can occur when a hacker can gain the qualifications of a user with at least a contributor level of access starts the attack.

The U.S. Government National Vulnerability Database describes the reason for the vulnerability and how an attack can occur:

“The Popup Maker WordPress plugin prior to 1.16.9 does not validate and get away among its shortcode attributes, which might permit users with a role as low as factor to perform Stored Cross-Site Scripting attacks.”

An official changelog published by the plugin author indicates that the make use of permits a person with factor level access to run JavaScript.

The Popup Maker Plugin changelog for variation V1.16.9 notes:

“Security: Patched XSS vulnerability allowing contributors to run unfiltered JavaScript.”

Security business WPScan (owned by Automattic) released a proof of concept that demonstrates how the exploit works.

“As a contributor, put the following shortcode in a post/page

[pum_sub_form name_field_type=”fullname” label_name=”Name” label_email=”Email” label_submit=”Subscribe” placeholder_name=”Call” placeholder_email=”Email” form_layout=”block” form_alignment=”center” form_style=”default” privacy_consent_enabled=”yes” privacy_consent_label=”Alert me about related material and special deals.” privacy_consent_type=”radio” privacy_consent_radio_layout=”inline” privacy_consent_yes_label=”Yes” privacy_consent_no_label=”No” privacy_usage_text=”If you decide in above we utilize this info send associated content, discount rates and other special deals.” redirect_enabled redirect=”javascript: alert(/ XSS/)”]

The XSS will be activated when previewing/viewing the post/page and sending the type”

While there is no description of how bad the exploit can be, in general, Stored XSS vulnerabilities can have extreme repercussions including full site takeover, user information exposure and the planting of Trojan horse programs.

There have been subsequent updates since the initial patch was provided for variation 1.16.9, consisting of a more recent upgrade that repairs a bug that was presented with the security patch.

The most present variation of the Popup Maker plugin is V1.17.1.

Publishers who have the plugin set up need to consider upgrading the most recent version.


Check Out the U.S. Government National Vulnerability Database advisory:

CVE-2022-4381 Information

Read the WPScan Advisory

Popup Maker < 1.16.9-- Factor+ Stored XSS by means of Subscription Form

Featured image by SMM Panel/Asier Romero