{"api_version":"1","generated_at":"2026-04-21T21:15:21+00:00","cve":"CVE-2022-4017","urls":{"html":"https://cve.report/CVE-2022-4017","api":"https://cve.report/api/cve/CVE-2022-4017.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4017","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4017"},"summary":{"title":"CVE-2022-4017","description":"The Booster for WooCommerce WordPress plugin before 6.0.1, Booster Plus for WooCommerce WordPress plugin before 6.0.1, Booster Elite for WooCommerce WordPress plugin before 6.0.1 have either flawed CSRF checks or are missing them completely in numerous places, allowing attackers to make logged in users perform unwanted actions via CSRF attacks","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-01-23 15:15:00","updated_at":"2023-11-07 03:56:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4","name":"https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4","refsource":"MISC","tags":[],"title":"Booster for WooCommerce - Multiple CSRF WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4017","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4017","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4017","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_elite_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4017","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_for_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"4017","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"booster","cpe5":"booster_plus_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-4017","qid":"150646","title":"WordPress Booster for Woocommerce Plugin: Cross-Site Resource Forgery (CSRF) Vulnerability(CVE-2022-4017)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4017","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Booster for WooCommerce WordPress plugin before 6.0.1, Booster Plus for WooCommerce WordPress plugin before 6.0.1, Booster Elite for WooCommerce WordPress plugin before 6.0.1 have either flawed CSRF checks or are missing them completely in numerous places, allowing attackers to make logged in users perform unwanted actions via CSRF attacks"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Booster for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}},{"product_name":"Booster Plus for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}},{"product_name":"Booster Elite for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4","refsource":"MISC","name":"https://wpscan.com/vulnerability/609072d0-9bb9-4fe0-9626-7e4a334ca3a4"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"WPScan"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-01-23 15:15:00","lastModifiedDate":"2023-11-07 03:56:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"6.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_elite_woocommerce:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"6.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:booster:booster_plus_woocommerce:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"6.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}