Vulnerabilities and security researches forpopup-builder popup-builder
Direction: descendingFeb 27, 2026
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2025-13079
- CVE, Research URL
- Home page URL
- Date
- Feb 19, 2026
- Research Description
- The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.4.2. This is due to the plugin generating predictable unsubscribe tokens using deterministic data. This makes it possible for unauthenticated attackers to unsubscribe arbitrary subscribers from mailing lists via brute-forcing the unsubscribe token, granted they know the victim's email address
- Affected versions
-
max 4.4.3.
- Status
-
vulnerable
Dec 12, 2024
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2024-9428
- CVE, Research URL
- Home page URL
- Date
- Dec 12, 2024
- Research Description
- The Popup Builder WordPress plugin before 4.3.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
max 4.3.5.
- Status
-
vulnerable
Aug 30, 2024
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2024-2541
- CVE, Research URL
- Home page URL
- Date
- Aug 29, 2024
- Research Description
- The Popup Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.3 via the Subscribers Import feature. This makes it possible for unauthenticated attackers to extract sensitive data after an administrator has imported subscribers via a CSV file. This data may include the first name, last name, e-mail address, and potentially other personally identifiable information of subscribers.
- Affected versions
-
max 4.3.7.
- Status
-
vulnerable
Jun 17, 2024
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2024-2544
- CVE, Research URL
- Home page URL
- Date
- Jun 15, 2024
- Research Description
- The Popup Builder plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on all AJAX actions. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform multiple unauthorized actions, such as deleting subscribers, and importing subscribers to conduct stored cross-site scripting attacks.
- Affected versions
-
max 4.3.2.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2023-6696
- CVE, Research URL
- Home page URL
- Date
- Jun 15, 2024
- Research Description
- The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 4.3.1. While some functions contain a nonce check, the nonce can be obtained from the profile page of a logged-in user. This allows subscribers to perform several actions including deleting subscribers and perform blind Server-Side Request Forgery.
- Affected versions
-
max 4.3.2.
- Status
-
vulnerable
Jun 07, 2024
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2022-0479
- CVE, Research URL
- Home page URL
- Date
- Mar 28, 2022
- Research Description
- The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link
- Affected versions
-
max 3.45.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2022-0228
- CVE, Research URL
- Home page URL
- Date
- Feb 21, 2022
- Research Description
- The Popup Builder WordPress plugin before 4.0.7 does not validate and properly escape the orderby and order parameters before using them in a SQL statement in the admin dashboard, which could allow high privilege users to perform SQL injection
- Affected versions
-
max 4.1.1.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2021-25082
- CVE, Research URL
- Home page URL
- Date
- Feb 21, 2022
- Research Description
- The Popup Builder WordPress plugin before 4.0.7 does not validate and sanitise the sgpb_type parameter before using it in a require statement, leading to a Local File Inclusion issue. Furthermore, since the beginning of the string can be controlled, the issue can lead to RCE vulnerability via wrappers such as PHAR
- Affected versions
-
max 4.1.1.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2021-24152
- CVE, Research URL
- Home page URL
- Date
- Apr 06, 2021
- Research Description
- The "All Subscribers" setting page of Popup Builder was vulnerable to reflected Cross-Site Scripting.
- Affected versions
-
max 3.74.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2020-10195
- CVE, Research URL
- Home page URL
- Date
- Mar 13, 2020
- Research Description
- The popup-builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
- Affected versions
-
max 3.64.1.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2020-10196
- CVE, Research URL
- Home page URL
- Date
- Mar 13, 2020
- Research Description
- An XSS vulnerability in the popup-builder plugin before 3.64.1 for WordPress allows remote attackers to inject arbitrary JavaScript into existing popups via an unsecured ajax action in com/classes/Ajax.php. It is possible for an unauthenticated attacker to insert malicious JavaScript in several of the popup's fields by sending a request to wp-admin/admin-ajax.php with the POST action parameter of sgpb_autosave and including additional data in an allPopupData parameter, including the popup's ID (which is visible in the source of the page in which the popup is inserted) and arbitrary JavaScript which will then be executed in the browsers of visitors to that page. Because the plugin functionality automatically adds script tags to data entered into these fields, this injection will typically bypass most WAF applications.
- Affected versions
-
max 3.64.1.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2023-3226
- CVE, Research URL
- Home page URL
- Date
- Sep 25, 2023
- Research Description
- The Popup Builder WordPress plugin before 4.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
max 4.2.2.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2023-6000
- CVE, Research URL
- Home page URL
- Date
- Jan 01, 2024
- Research Description
- The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.
- Affected versions
-
max 4.2.3.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2024-30184
- CVE, Research URL
- Home page URL
- Date
- Mar 27, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Looking Forward Software Incorporated. Popup Builder allows Stored XSS.This issue affects Popup Builder: from n/a through 4.2.6.
- Affected versions
-
max 4.2.7.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2024-2506
- CVE, Research URL
- Home page URL
- Date
- Jun 01, 2024
- Research Description
- The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS functionality in all versions up to, and including, 4.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 4.3.0.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2022-32289
- CVE, Research URL
- Home page URL
- Date
- Jul 21, 2022
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Sygnoos Popup Builder plugin <= 4.1.0 at WordPress leading to popup status change.
- Affected versions
-
max 4.1.11.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2022-1894
- CVE, Research URL
- Home page URL
- Date
- Jul 11, 2022
- Research Description
- The Popup Builder WordPress plugin before 4.1.11 does not escape and sanitize some settings, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfiltred_html is disallowed
- Affected versions
-
max 4.1.11.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2023-6294
- CVE, Research URL
- Home page URL
- Date
- Feb 12, 2024
- Research Description
- The Popup Builder WordPress plugin before 4.2.6 does not validate a parameter before making a request to it, which could allow users with the administrator role to perform SSRF attack in Multisite WordPress configurations.
- Affected versions
-
max 4.2.6.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2020-9006
- CVE, Research URL
- Home page URL
- Date
- Feb 17, 2020
- Research Description
- The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)
- Affected versions
-
max 3.0.2.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2019-14695
- CVE, Research URL
- Home page URL
- Date
- Aug 06, 2019
- Research Description
- A SQL injection vulnerability exists in the Sygnoos Popup Builder plugin before 3.45 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via com/libs/Table.php because Subscribers Table ordering is mishandled.
- Affected versions
-
max 3.45.
- Status
-
vulnerable
Popup Builder – Create highly converting, mobile friendly marketing popups. # CVE-2022-29495
- CVE, Research URL
- Home page URL
- Date
- Jul 22, 2022
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Sygnoos Popup Builder plugin <= 4.1.11 at WordPress allows an attacker to update plugin settings.
- Affected versions
-
max 3.72.
- Status
-
vulnerable