First published: Mon Jan 23 2023(Updated: )
The Booster for WooCommerce WordPress plugin before 6.0.1, Booster Plus for WooCommerce WordPress plugin before 6.0.1, Booster Elite for WooCommerce WordPress plugin before 6.0.1 have either flawed CSRF checks or are missing them completely in numerous places, allowing attackers to make logged in users perform unwanted actions via CSRF attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pluggabl Booster Elite for WooCommerce | <6.0.1 | |
Booster for WooCommerce | <6.0.1 | |
Booster Plus for WooCommerce | <6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4017 is high with a severity value of 8.8.
The Booster for WooCommerce WordPress plugin, Booster Plus for WooCommerce WordPress plugin, and Booster Elite for WooCommerce WordPress plugin are affected by CVE-2022-4017.
CVE-2022-4017 is a vulnerability in the Booster for WooCommerce WordPress plugin, Booster Plus for WooCommerce WordPress plugin, and Booster Elite for WooCommerce WordPress plugin, where flawed CSRF checks or missing checks allow attackers to make logged in users perform unintended actions.
An attacker can exploit CVE-2022-4017 by taking advantage of flawed CSRF checks or missing checks in the affected plugins, allowing them to perform actions on behalf of logged in users.
To fix CVE-2022-4017, update the Booster for WooCommerce WordPress plugin, Booster Plus for WooCommerce WordPress plugin, and Booster Elite for WooCommerce WordPress plugin to version 6.0.1 or later.