Description
The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated Arbitrary Shortcode Execution in all versions up to and including 1.1.7. This is due to the handle_email_verification_page() function constructing a shortcode string from user-supplied GET parameters (token, email) and passing it to do_shortcode() without properly sanitizing square bracket characters, combined with missing authorization checks on the init hook. While sanitize_text_field() and esc_attr() are applied, neither function strips or escapes square bracket characters ([ and ]). WordPress's shortcode regex uses [^\]\/]* to match content inside shortcode tags, meaning a ] character in the token value prematurely closes the shortcode tag. This makes it possible for unauthenticated attackers to inject and execute arbitrary registered shortcodes by crafting a malicious token parameter containing ] followed by arbitrary shortcode syntax.
Published: 2026-03-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Arbitrary Shortcode Execution
Action: Immediate Patch
AI Analysis

Impact

The Instant Popup Builder plugin for WordPress is affected by a flaw that allows any unauthenticated user to inject and execute arbitrary registered shortcodes. The vulnerability arises in the handle_email_verification_page() function, which concatenates user‑supplied GET parameters (token and email) into a shortcode string and passes it to WordPress’s do_shortcode() function without proper sanitization of square bracket characters. The sanitization functions used do not strip or escape brackets, and an authorization check is missing for the init hook. The result is that a malicious token containing a closing bracket can prematurely terminate a legitimate shortcode tag, allowing the attacker to insert and run arbitrary shortcode syntax. This weakness is classified as CWE‑862. The impact is that an attacker can execute any shortcode that is registered on the target site, potentially leading to data disclosure, unauthorized code execution, or other malicious actions depending on the shortcodes available.

Affected Systems

All WordPress sites that have the Instant Popup Builder plugin installed with a version equal to or older than 1.1.7 are vulnerable. The affected vendor product is "Instant Popup Builder – Powerful Popup Maker for Opt‑ins, Email Newsletters & Lead Generation". Any instance of this plugin that has not been upgraded beyond the stated version is potentially exploitable.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires only an unauthenticated HTTP GET request to the email‑verification page with a crafted token parameter; no additional privileges are required. Because the attacker can execute any shortcode present on the site, the potential impact ranges from content manipulation to code execution, depending on the site’s configuration and installed plugins. The risk is therefore significant enough to warrant prompt action, especially in environments where the plugin is actively used.

Generated by OpenCVE AI on March 19, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Instant Popup Builder plugin to the latest available version to remove the vulnerable code.
  • If an update cannot be applied immediately, deactivate or delete the plugin to prevent the vulnerable routine from running.
  • In case downtime is unacceptable and an immediate update is not possible, apply a custom patch that sanitizes or strips square bracket characters from the token and email parameters before calling do_shortcode() to prevent arbitrary shortcode injection.

Generated by OpenCVE AI on March 19, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Instantpopupbuilder
Instantpopupbuilder instant Popup Builder – Powerful Popup Maker For Opt-ins, Email Newsletters & Lead Generation
Wordpress
Wordpress wordpress
Vendors & Products Instantpopupbuilder
Instantpopupbuilder instant Popup Builder – Powerful Popup Maker For Opt-ins, Email Newsletters & Lead Generation
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated Arbitrary Shortcode Execution in all versions up to and including 1.1.7. This is due to the handle_email_verification_page() function constructing a shortcode string from user-supplied GET parameters (token, email) and passing it to do_shortcode() without properly sanitizing square bracket characters, combined with missing authorization checks on the init hook. While sanitize_text_field() and esc_attr() are applied, neither function strips or escapes square bracket characters ([ and ]). WordPress's shortcode regex uses [^\]\/]* to match content inside shortcode tags, meaning a ] character in the token value prematurely closes the shortcode tag. This makes it possible for unauthenticated attackers to inject and execute arbitrary registered shortcodes by crafting a malicious token parameter containing ] followed by arbitrary shortcode syntax.
Title Instant Popup Builder <= 1.1.7 - Unauthenticated Arbitrary Shortcode Execution via 'token' Parameter
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Instantpopupbuilder Instant Popup Builder – Powerful Popup Maker For Opt-ins, Email Newsletters & Lead Generation
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:30.120Z

Reserved: 2026-03-03T13:12:45.335Z

Link: CVE-2026-3475

cve-icon Vulnrichment

Updated: 2026-03-19T13:44:18.600Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T08:16:19.327

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-3475

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:15:38Z

Weaknesses