An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file").
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
http://blog.redyops.com/wordpress-plugin-popup-maker/ | third party advisory exploit |
https://github.com/PopupMaker/Popup-Maker/blob/master/CHANGELOG.md | release notes |
https://wpvulndb.com/vulnerabilities/9907 | third party advisory |