// For flags

CVE-2022-3762

Booster for WooCommerce - ShopManager+ Arbitrary File Download

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite)

El complemento Booster for WooCommerce WordPress anterior a 5.6.7, el complemento Booster Plus para WooCommerce WordPress anterior a 5.6.5, el complemento Booster Elite para WooCommerce WordPress anterior a 1.1.7 no validan archivos para descargar en algunos de sus módulos, lo que podría permitir que ShopManager y Admin descargar archivos arbitrarios del servidor incluso cuando se supone que no pueden hacerlo (por ejemplo, en multisitio)

The Booster Elite for WooCommerce plugin for WordPress is vulnerable to Arbitrary File Download in versions up to, but not including, 1.1.7. This makes it possible for administrator-level attackers to download files from the website, leading to the extraction of sensitive user or configuration data.

*Credits: WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-10-31 CVE Reserved
  • 2022-10-31 CVE Published
  • 2024-06-13 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 1.1.7
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 1.1.7"
elite, wordpress
Affected
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 5.6.5
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 5.6.5"
plus, wordpress
Affected
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 5.6.7
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 5.6.7"
wordpress
Affected