Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaws in Popup Builder Plugin Impacted Over 100,000 WordPress Sites

More than 100,000 WordPress websites were potentially affected by a series of vulnerabilities recently discovered and addressed in the Popup Builder plugin.

More than 100,000 WordPress websites were potentially affected by a series of vulnerabilities recently discovered and addressed in the Popup Builder plugin.

Designed to help with the creation and management of promotional modal pop-ups for WordPress blogs and websites, Popup Builder also includes the ability to run custom JavaScript code when the pop-up is loaded.

Security researchers at WordPress security firm Defiant report that Popup Builder before version 3.64.1 is impacted by vulnerabilities that could allow attackers to inject malicious code without authentication, or leak user information and system configuration data.

The most important of the vulnerabilities is a high-severity stored cross-site scripting (XSS) bug tracked as CVE-2020-10196 and featuring a CVSS score of 8.3.

The security flaw could be exploited by an unauthenticated attacker to inject malicious JavaScript code into any pop-up, thus having it executed when the pop-up is loaded.

The plugin registered an AJAX hook intended to allow auto-saving of draft pop-ups, but the hook was found to be exposed to unprivileged users. Moreover, the function called by the hook did not include nonce checks or capability checks.

Because of that, an attacker could send a POST request to wp-admin/admin-ajax.php with a malicious JavaScript payload, which would result in the payload being saved to the pop-up’s settings and executed whenever the pop-up is displayed on a page.

While such vulnerabilities are typically abused to redirect users to malvertising sites or for information theft, the issue could also be leveraged for site takeover if the infected pop-up was displayed to a logged-in administrator, Defiant says.

Another issue addressed in the plugin this week is CVE-2020-10195 (CVSS score 6.3), which could allow a low-privileged authenticated user to export a list of all newsletter subscribers and system configuration details, or even grant themselves access to features of the plugin.

The vulnerabilities were reported to the plugin’s developer on March 5, with a fully patched version of Popup Builder (version 3.64.1) released on March 11.

“While we have not detected any malicious activity targeting Popup Builder, the stored XSS vulnerability can have a serious impact on site visitors and potentially even allow site takeover,” Defiant underlines.

Related: Patches Released for WordPress Plugin Vulnerabilities Exploited in Attacks

Related: WordPress Websites Hacked via Vulnerabilities in Two Themes Plugins

Related: Flaw in WordPress Themes Plugin Allowed Hackers to Become Site Admin

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet