First published: Mon Feb 17 2020(Updated: )
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sygnoos Popup Builder | >=2.2.8<=2.6.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9006 is a vulnerability in the Popup Builder plugin for WordPress that allows for SQL injection via PHP Deserialization.
CVE-2020-9006 is considered critical, with a severity score of 9.8 out of 10.
Popup Builder plugin versions between 2.2.8 and 2.6.7.6 for WordPress are affected by CVE-2020-9006.
CVE-2020-9006 works by exploiting a SQL injection vulnerability in the sgImportPopups function in sg_popup_ajax.php via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable.
You can find more information about CVE-2020-9006 at the following references: [1] [2] [3].