vulnerability
WordPress Plugin: woocommerce-jetpack: CVE-2022-3762: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:M/C:C/I:C/A:N) | Oct 27, 2022 | May 15, 2025 | Jul 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:M/C:C/I:C/A:N)
Published
Oct 27, 2022
Added
May 15, 2025
Modified
Jul 10, 2025
Description
The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file downloads due to missing sanitization and filename validation of a user-supplied parameter in versions up to, and including, 5.6.6 (5.6.4 for Booster Plus). This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to download arbitrary files on the affected sites server.
Solution
woocommerce-jetpack-plugin-cve-2022-3762
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.