First published: Thu May 02 2024(Updated: )
The Booster for WooCommerce plugin is vulnerable to Unauthenticated Arbitrary Shortcode Execution in versions up to, and including, 7.1.8. This allows unauthenticated attackers to execute arbitrary shortcodes. The severity and exploitability depends on what other plugins are installed and what shortcode functionality they provide.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Booster for WooCommerce | <7.1.9 | |
Booster for WooCommerce | <=7.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3957 is classified with a severity that varies based on the plugins installed alongside Booster for WooCommerce.
To fix CVE-2024-3957, upgrade the Booster for WooCommerce plugin to version 7.1.9 or later.
Anyone using Booster for WooCommerce versions up to and including 7.1.8 is affected by CVE-2024-3957.
An attacker exploiting CVE-2024-3957 can execute arbitrary shortcodes without authentication.
The exploitability of CVE-2024-3957 depends on the specific setup and configuration of other plugins in use.