First published: Thu Oct 19 2023(Updated: )
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcj_image' shortcode in versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booster for WooCommerce | <=7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-5638.
The vulnerable plugin is called Booster for WooCommerce.
This vulnerability allows authenticated attackers to execute stored cross-site scripting attacks.
Versions up to and including 7.1.2 are affected by this vulnerability.
Update the Booster for WooCommerce plugin to a version higher than 7.1.2.