First published: Fri Oct 20 2023(Updated: )
The Booster for WooCommerce for WordPress is vulnerable to Information Disclosure via the 'wcj_wp_option' shortcode in versions up to, and including, 7.1.0 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive site options.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booster for WooCommerce | <7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4796 is a vulnerability in the Booster for WooCommerce for WordPress plugin that allows authenticated attackers to disclose sensitive information.
CVE-2023-4796 has a severity rating of 4.3, which is considered medium.
The affected software of CVE-2023-4796 is Booster for WooCommerce for WordPress versions up to and including 7.1.0.
An attacker can exploit CVE-2023-4796 by using the 'wcj_wp_option' shortcode to retrieve sensitive information.
Yes, the fix for CVE-2023-4796 is to update to version 7.1.1 or later of the Booster for WooCommerce for WordPress plugin.