First published: Mon Nov 21 2022(Updated: )
The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booster for WooCommerce | <1.1.7 | |
Booster for WooCommerce | <5.6.5 | |
Booster for WooCommerce | <5.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3763 is high.
The affected software for CVE-2022-3763 is the Booster for WooCommerce WordPress plugin versions up to 5.6.7, Booster Plus for WooCommerce WordPress plugin versions up to 5.6.5, and Booster Elite for WooCommerce WordPress plugin versions up to 1.1.7.
The vulnerability of CVE-2022-3763 is the lack of CSRF check when deleting files uploaded at the checkout, potentially allowing attackers to make a logged-in shop.
To fix CVE-2022-3763, update the Booster for WooCommerce WordPress plugin to version 5.6.7, Booster Plus for WooCommerce WordPress plugin to version 5.6.5, and Booster Elite for WooCommerce WordPress plugin to version 1.1.7.
Yes, you can find more information about CVE-2022-3763 at the following reference: [CVE-2022-3763](https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f)