vulnerability
WordPress Plugin: booster-plus-for-woocommerce: CVE-2022-3762: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:C/I:N/A:N) | Oct 27, 2022 | May 15, 2025 | May 15, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:C/I:N/A:N)
Published
Oct 27, 2022
Added
May 15, 2025
Modified
May 15, 2025
Description
The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file downloads due to missing sanitization and filename validation of a user-supplied parameter in versions up to, and including, 5.6.6 (5.6.4 for Booster Plus). This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to download arbitrary files on the affected sites server.
Solution
booster-plus-for-woocommerce-plugin-cve-2022-3762

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.