QID 150597

Date Published: 2022-11-28

QID 150597: WordPress Booster for Woocommerce Plugin: Multiple Vulnerabilities (CVE-2022-41805,CVE-2022-3763,CVE-2022-3762)

Booster for WooCommerce is an addon plugin for WooCommerce designed to enhance its functionality through the use of various modules that site owners can enable and disable at any point.

Booster for WooCommerce contains multiple vulnerabilities:
CVE-2022-41805: The plugin does not have CSRF checks, allowing attackers to perform CSRF attack.

CVE-2022-3762: The plugins do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite)

CVE-2022-3763: The plugins do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack

Affected Versions:
The Booster for WooCommerce WordPress plugin before 5.6.7

QID Detection Logic:
This QID sends a HTTP GET request and checks for vulnerable version of WordPress plugin running on the target application.

Successful exploitation could allow an attacker to execute arbitrary JavaScript code in the context of the interface or download arbitrary files from the server.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to Booster for WooCommerce 5.6.7 or later version to remediate this vulnerability.

    CVEs related to QID 150597

    Software Advisories
    Advisory ID Software Component Link
    CVE-2022-3762 URL Logo wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac
    CVE-2022-3763 URL Logo wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f
    CVE-2022-41805 URL Logo patchstack.com/database/vulnerability/woocommerce-jetpack/wordpress-booster-for-woocommerce-plugin-5-6-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve