{"api_version":"1","generated_at":"2026-04-22T02:46:52+00:00","cve":"CVE-2022-3763","urls":{"html":"https://cve.report/CVE-2022-3763","api":"https://cve.report/api/cve/CVE-2022-3763.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3763","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3763"},"summary":{"title":"CVE-2022-3763","description":"The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-11-21 11:15:00","updated_at":"2023-11-07 03:51:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f","name":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f","refsource":"CONFIRM","tags":[],"title":"Booster for WooCommerce - Checkout Files Deletion via CSRF WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3763","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3763","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"3763","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_for_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3763","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_for_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"elite","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"3763","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_for_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"plus","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-3763","qid":"150597","title":"WordPress Booster for Woocommerce Plugin: Multiple Vulnerabilities (CVE-2022-41805,CVE-2022-3763,CVE-2022-3762)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-3763","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Booster for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}},{"product_name":"Booster Plus for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}},{"product_name":"Booster Elite for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f","refsource":"MISC","name":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2022-11-21 11:15:00","lastModifiedDate":"2023-11-07 03:51:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"5.6.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*","versionEndExcluding":"1.1.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:plus:wordpress:*:*","versionEndExcluding":"5.6.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}