CVE-2025-9856: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in popupbuilder Popup Builder – Create highly converting, mobile friendly marketing popups.
The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sg_popup' shortcode in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9856 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Popup Builder WordPress plugin, which is used to create mobile-friendly marketing popups. The vulnerability exists in all versions up to and including 4.4.1 due to improper neutralization of user-supplied input within the 'sg_popup' shortcode. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level access or higher. This flaw allows these users to inject arbitrary JavaScript code that is stored and later executed in the context of any user who visits the affected page. Because the vulnerability is stored, the malicious script persists and can affect multiple users over time. The CVSS 3.1 score of 6.4 reflects a medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change indicating that the vulnerability affects resources beyond the initial component. The impact includes potential disclosure of sensitive information (confidentiality impact) and modification of content or behavior (integrity impact), but no direct availability impact. No public exploits have been reported yet, but the vulnerability poses a risk especially on sites with multiple contributors or editors. The plugin’s widespread use in WordPress marketing sites increases the attack surface. The vulnerability highlights the importance of proper input validation and output encoding in web applications, particularly in plugins that accept user-generated content.
Potential Impact
The primary impact of CVE-2025-9856 is the potential compromise of confidentiality and integrity on affected WordPress sites using the Popup Builder plugin. An attacker with contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, theft of sensitive data such as cookies or credentials, unauthorized actions performed on behalf of users, or defacement of website content. Since the vulnerability is stored, the malicious payload persists and can affect multiple users over time, increasing the risk and reach of the attack. Although availability is not directly impacted, the reputational damage and loss of user trust can be significant. Organizations relying on this plugin for marketing purposes may face data breaches or unauthorized access incidents. The requirement for authenticated access reduces the risk from anonymous attackers but does not eliminate it, especially in environments with many contributors or editors. The medium CVSS score reflects a moderate risk, but the real-world impact depends on the site's user roles and the sensitivity of data handled. Exploitation could also facilitate further attacks such as privilege escalation or malware distribution.
Mitigation Recommendations
To mitigate CVE-2025-9856, organizations should take the following specific actions: 1) Immediately review and restrict contributor-level user privileges to only trusted individuals, minimizing the risk of malicious input. 2) Monitor and audit all content created via the 'sg_popup' shortcode for suspicious or unexpected scripts. 3) Implement Web Application Firewall (WAF) rules that detect and block common XSS payloads targeting the Popup Builder plugin. 4) Encourage or enforce the use of Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Regularly update the Popup Builder plugin to the latest version once the vendor releases a patch addressing this vulnerability. 6) If a patch is not yet available, consider temporarily disabling the plugin or the shortcode functionality to prevent exploitation. 7) Educate site administrators and contributors about the risks of injecting untrusted content and the importance of secure coding practices. 8) Employ security plugins that scan for malicious code injections and anomalous behavior within WordPress environments. These measures combined will reduce the attack surface and help prevent exploitation until a permanent fix is deployed.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-9856: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in popupbuilder Popup Builder – Create highly converting, mobile friendly marketing popups.
Description
The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sg_popup' shortcode in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9856 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Popup Builder WordPress plugin, which is used to create mobile-friendly marketing popups. The vulnerability exists in all versions up to and including 4.4.1 due to improper neutralization of user-supplied input within the 'sg_popup' shortcode. Specifically, the plugin fails to adequately sanitize and escape attributes provided by authenticated users with contributor-level access or higher. This flaw allows these users to inject arbitrary JavaScript code that is stored and later executed in the context of any user who visits the affected page. Because the vulnerability is stored, the malicious script persists and can affect multiple users over time. The CVSS 3.1 score of 6.4 reflects a medium severity, with an attack vector of network, low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change indicating that the vulnerability affects resources beyond the initial component. The impact includes potential disclosure of sensitive information (confidentiality impact) and modification of content or behavior (integrity impact), but no direct availability impact. No public exploits have been reported yet, but the vulnerability poses a risk especially on sites with multiple contributors or editors. The plugin’s widespread use in WordPress marketing sites increases the attack surface. The vulnerability highlights the importance of proper input validation and output encoding in web applications, particularly in plugins that accept user-generated content.
Potential Impact
The primary impact of CVE-2025-9856 is the potential compromise of confidentiality and integrity on affected WordPress sites using the Popup Builder plugin. An attacker with contributor-level access can inject malicious scripts that execute in the browsers of site visitors and administrators, potentially leading to session hijacking, theft of sensitive data such as cookies or credentials, unauthorized actions performed on behalf of users, or defacement of website content. Since the vulnerability is stored, the malicious payload persists and can affect multiple users over time, increasing the risk and reach of the attack. Although availability is not directly impacted, the reputational damage and loss of user trust can be significant. Organizations relying on this plugin for marketing purposes may face data breaches or unauthorized access incidents. The requirement for authenticated access reduces the risk from anonymous attackers but does not eliminate it, especially in environments with many contributors or editors. The medium CVSS score reflects a moderate risk, but the real-world impact depends on the site's user roles and the sensitivity of data handled. Exploitation could also facilitate further attacks such as privilege escalation or malware distribution.
Mitigation Recommendations
To mitigate CVE-2025-9856, organizations should take the following specific actions: 1) Immediately review and restrict contributor-level user privileges to only trusted individuals, minimizing the risk of malicious input. 2) Monitor and audit all content created via the 'sg_popup' shortcode for suspicious or unexpected scripts. 3) Implement Web Application Firewall (WAF) rules that detect and block common XSS payloads targeting the Popup Builder plugin. 4) Encourage or enforce the use of Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Regularly update the Popup Builder plugin to the latest version once the vendor releases a patch addressing this vulnerability. 6) If a patch is not yet available, consider temporarily disabling the plugin or the shortcode functionality to prevent exploitation. 7) Educate site administrators and contributors about the risks of injecting untrusted content and the importance of secure coding practices. 8) Employ security plugins that scan for malicious code injections and anomalous behavior within WordPress environments. These measures combined will reduce the attack surface and help prevent exploitation until a permanent fix is deployed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-02T15:30:05.856Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d2749f35c2264d84723b0
Added to database: 12/13/2025, 8:43:53 AM
Last enriched: 2/26/2026, 6:13:31 PM
Last updated: 3/23/2026, 4:46:09 PM
Views: 142
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.