• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Flawed WordPress popup plugin allows attackers to inject malicious code

March 13, 2020
Share on FacebookShare on Twitter

Vulnerabilities have been discovered in a popular WordPress plugin called Popup Builder which could allow unauthenticated attackers to inject malicious JavaScript code into popups in order to steal information and even potentially take full control over targeted sites.

The plugin gives site owners the ability to create, deploy and manage customizable popups using a range of different content from HTML and JavaScript code to images and videos. Sygnoos, the developer of Popup Builder, says that businesses can utilize it to increase their sales and revenue through its smart popups that can be used to display ads, subscription requests, discounts and other promotional content.

The security flaws in the plugin, which affect all versions of Popup Builder up to version 3.63, were first discovered by Ram Gall who works as a QA engineer at Defiant. Gall provided further details on how an attacker would use the vulnerabilities he found in the plugin in a blog post, saying:

“Typically, attackers use a vulnerability like this to redirect site visitors to malvertising sites or steal sensitive information from their browsers, though it could also be used for site takeover if an administrator visited or previewed a page containing the infected popup while logged in.”

One of the vulnerabilities Gall discovered in the Popup Builder plugin allows an unauthenticated attacker to inject malicious JavaScript code into any published popup and the code would then be executed whenever it is loaded.

The other vulnerability makes it possible for any user that is logged in (with permissions as low as a subscriber) to gain access to plugin features to export subscriber lists and system configuration info using a simple POST request to admin-post.php.

The security flaws, tracked as CVE-2020-10196 and CVE-2020-10195, have both been fixed by Sygnoos with the release of Popup Builder version 3.65.1, after Gall disclosed the bugs to the company.

However, only 33,000 users of the plugin’s 100,000+ users have updated to the latest version which means that over 66,000 sites with previous versions of Popup Builder are still vulnerable and could be targeted by hackers.

Via BleepingComputer

Next Post

The Pixel 4a's storage could feature a surprise upgrade

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Mouse: P.I. for Hire Preview — Aces So Far | Console Creatures
  • Yes, T-Mobile will really give you the Pixel 10a AND some earbuds for free with “most plans” — so what’s the catch?
  • Today’s Hurdle hints and answers for March 6, 2026
  • Forza Horizon 6: 9 Minutes of Exclusive Gameplay
  • Moon phase today explained: What the Moon will look like on March 6, 2026

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously