First published: Mon Dec 26 2022(Updated: )
The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pluggabl Booster Elite for WooCommerce | <6.0.0 | |
Booster for WooCommerce | <5.6.3 | |
Booster Plus for WooCommerce | <6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-4227.
The severity of CVE-2022-4227 is medium (6.1).
The Booster for WooCommerce WordPress plugin (before 5.6.3), Booster Plus for WooCommerce WordPress plugin (before 6.0.0), and Booster Elite for WooCommerce WordPress plugin (before 6.0.0) are affected by CVE-2022-4227.
CVE-2022-4227 can lead to Reflected Cross-Site Scripting (XSS) attacks.
To fix CVE-2022-4227, update the Booster for WooCommerce WordPress plugin to version 5.6.3 or later, the Booster Plus for WooCommerce WordPress plugin to version 6.0.0 or later, or the Booster Elite for WooCommerce WordPress plugin to version 6.0.0 or later.