CVE-2022-0479

9.8 CRITICAL

📋 TL;DR

This vulnerability in the Popup Builder WordPress plugin allows SQL injection and reflected XSS attacks. Attackers can exploit it by sending malicious links to logged-in administrators, potentially compromising the WordPress database and admin sessions. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Popup Builder WordPress Plugin
Versions: All versions before 4.1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress admin dashboard access; exploitation needs admin to click malicious link.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise leading to data theft, privilege escalation, and complete site takeover via SQL injection, combined with admin session hijacking via XSS.

🟠

Likely Case

Database information disclosure, potential admin account compromise via XSS, and limited data manipulation.

🟢

If Mitigated

No impact if plugin is patched or workarounds are implemented; minimal risk with proper network segmentation and admin security practices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick admin into clicking malicious link; SQL injection is straightforward once access is gained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.1

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2686454

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard. 2. Navigate to Plugins > Installed Plugins. 3. Find Popup Builder plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 4.1.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate popup-builder

Input Sanitization Rule

all

Add WAF rule to block malicious sgpb-subscription-popup-id parameters

🧯 If You Can't Patch

  • Restrict admin dashboard access to trusted IP addresses only
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin dashboard under Plugins > Installed Plugins

Check Version:

wp plugin get popup-builder --field=version

Verify Fix Applied:

Confirm plugin version is 4.1.1 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries containing sgpb-subscription-popup-id parameter
  • Admin dashboard access from unexpected IPs

Network Indicators:

  • HTTP requests with malicious payloads in sgpb-subscription-popup-id parameter

SIEM Query:

SELECT * FROM logs WHERE url LIKE '%sgpb-subscription-popup-id=%' AND (payload LIKE '%SELECT%' OR payload LIKE '%UNION%' OR payload LIKE '%script%')

🔗 References

📤 Share & Export