CVE-2025-62902

7.5 HIGH

📋 TL;DR

This vulnerability in the WP Popup Builder WordPress plugin allows unauthorized users to retrieve embedded sensitive data from the system. It affects all WordPress sites running WP Popup Builder version 1.3.6 or earlier. The exposure occurs through improper access controls that leak sensitive information to unauthorized parties.

💻 Affected Systems

Products:
  • ThemeHunk WP Popup Builder WordPress Plugin
Versions: All versions up to and including 1.3.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive WordPress configuration data, database credentials, API keys, or other embedded secrets, potentially leading to complete site compromise and data exfiltration.

🟠

Likely Case

Unauthenticated attackers can access sensitive system information that should be protected, enabling reconnaissance for further attacks or direct data exposure.

🟢

If Mitigated

With proper web application firewalls and access controls, the exposure could be limited to information leakage without direct system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves simple HTTP requests to access sensitive endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/wp-popup-builder/vulnerability/wordpress-wp-popup-builder-plugin-1-3-6-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WP Popup Builder. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.3.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the WP Popup Builder plugin until patched

wp plugin deactivate wp-popup-builder

Web Application Firewall Rule

all

Block access to vulnerable plugin endpoints

# Add WAF rule to block requests to /wp-content/plugins/wp-popup-builder/ sensitive endpoints

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit exposure
  • Deploy a web application firewall with rules to block unauthorized access to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Popup Builder version 1.3.6 or earlier

Check Version:

wp plugin get wp-popup-builder --field=version

Verify Fix Applied:

Verify plugin version is 1.3.7 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /wp-content/plugins/wp-popup-builder/ endpoints
  • Multiple 200 OK responses to sensitive plugin endpoints from unauthorized IPs

Network Indicators:

  • HTTP requests to wp-popup-builder endpoints without authentication
  • Traffic spikes to plugin-specific URLs

SIEM Query:

source="web_server" AND (url="*wp-popup-builder*" OR user_agent="*wp-popup-builder*") AND response_code=200

🔗 References

📤 Share & Export