{"api_version":"1","generated_at":"2026-04-23T17:15:49+00:00","cve":"CVE-2020-9006","urls":{"html":"https://cve.report/CVE-2020-9006","api":"https://cve.report/api/cve/CVE-2020-9006.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-9006","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-9006"},"summary":{"title":"CVE-2020-9006","description":"The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-02-17 15:15:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["CWE-89","CWE-502"],"metrics":[],"references":[{"url":"https://wpvulndb.com/vulnerabilities/10073","name":"https://wpvulndb.com/vulnerabilities/10073","refsource":"MISC","tags":["Third Party Advisory"],"title":"Popup Builder < 3.0 - SQL injection via PHP Deserialization Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69","name":"https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"403"},{"url":"https://wordpress.org/plugins/popup-builder/#developers","name":"https://wordpress.org/plugins/popup-builder/#developers","refsource":"MISC","tags":["Release Notes"],"title":"Popup Builder – Create highly converting, mobile friendly marketing popups. – WordPress plugin | WordPress.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/","name":"https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"CVE-2020-9006 – popup-builder WP Plugin SQL injection via PHP Deserialization – ZeroAuth","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-9006","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-9006","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"9006","vulnerable":"1","versionEndIncluding":"2.6.7.6","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sygnoos","cpe5":"popup_builder","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-9006","qid":"730988","title":"WordPress Plugin Popup Builder SQL Injection Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-9006","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://wordpress.org/plugins/popup-builder/#developers","refsource":"MISC","name":"https://wordpress.org/plugins/popup-builder/#developers"},{"url":"https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69","refsource":"MISC","name":"https://plugins.trac.wordpress.org/browser/popup-builder/tags/2.2.8/files/sg_popup_ajax.php#L69"},{"refsource":"MISC","name":"https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/","url":"https://zeroauth.ltd/blog/2020/02/16/cve-2020-9006-popup-builder-wp-plugin-sql-injection-via-php-deserialization/"},{"refsource":"MISC","name":"https://wpvulndb.com/vulnerabilities/10073","url":"https://wpvulndb.com/vulnerabilities/10073"}]}},"nvd":{"publishedDate":"2020-02-17 15:15:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["CWE-89","CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.2.8","versionEndIncluding":"2.6.7.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"9006","Ordinal":"169363","Title":"CVE-2020-9006","CVE":"CVE-2020-9006","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"9006","Ordinal":"1","NoteData":"The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.)","Type":"Description","Title":null},{"CveYear":"2020","CveId":"9006","Ordinal":"2","NoteData":"2020-02-17","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"9006","Ordinal":"3","NoteData":"2020-02-17","Type":"Other","Title":"Modified"}]}}}