Page 4 of 23 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite) El complemento Booster for WooCommerce WordPress anterior a 5.6.7, el complemento Booster Plus para WooCommerce WordPress anterior a 5.6.5, el complemento Booster Elite para WooCommerce WordPress anterior a 1.1.7 no validan archivos para descargar en algunos de sus módulos, lo que podría permitir que ShopManager y Admin descargar archivos arbitrarios del servidor incluso cuando se supone que no pueden hacerlo (por ejemplo, en multisitio) The Booster Elite for WooCommerce plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, but not including, 1.1.7. This makes it possible for administrator-level attackers to download files from the website, leading to the extraction of sensitive user or configuration data. • https://wpscan.com/vulnerability/96ef4bb8-a054-48ae-b29c-b3060acd01ac • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 1

The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack El complemento de WordPress Booster para WooCommerce anterior a 5.6.7, el complemento de WordPress Booster Plus para WooCommerce anterior a 5.6.5, el complemento de WordPress Booster Elite para WooCommerce anterior a 1.1.7 no tienen verificación CSRF al eliminar archivos cargados en la caja, lo que permite a los atacantes hacer que un administrador o administrador de la tienda que haya iniciado sesión los elimine mediante un ataque CSRF The Booster Elite for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, but not including, 1.1.7. This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers to delete files uploaded during a check-out, granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in Booster for WooCommerce plugin <= 5.6.6 on WordPress. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Booster para WooCommerce en WordPress en versiones &lt;= 5.6.6. The Booster for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to invoke those functions, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/woocommerce-jetpack/wordpress-booster-for-woocommerce-plugin-5-6-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_notice parameter before outputting it back in the admin dashboard when the Pdf Invoicing module is enabled, leading to a Reflected Cross-Site Scripting El plugin Booster for WooCommerce de WordPress versiones anteriores a 5.4.9, no sanea ni escapa del parámetro wcj_notice antes de devolverlo al panel de administración cuando el módulo Pdf Invoicing está habilitado, conllevando a un problema de tipo Cross-Site Scripting Reflejado • https://wpscan.com/vulnerability/8527f4fe-312f-45c1-ae4c-7e799702fc26 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_delete_role parameter before outputting back in the admin dashboard when the General module is enabled, leading to a Reflected Cross-Site Scripting issue El plugin Booster for WooCommerce de WordPress versiones anteriores a 5.4.9, no sanea ni escapa del parámetro wcj_delete_role antes de devolverlo al panel de administración cuando el módulo General está habilitado, conllevando a un problema de tipo Cross-Site Scripting Reflejado • https://wpscan.com/vulnerability/bc167b3a-24ee-4988-9934-189b6216ce40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •