// For flags

CVE-2022-4016

Booster for WooCommerce - Custom Role Creation/Deletion via CSRF

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.6, Booster Elite for WooCommerce WordPress plugin before 1.1.8 does not properly check for CSRF when creating and deleting Customer roles, allowing attackers to make logged admins create and delete arbitrary custom roles via CSRF attacks

Booster for WooCommerce complemento para WordPress anterior a 5.6.7, Booster Plus for WooCommerce complemento para WordPress anterior a 5.6.6, Booster Elite for WooCommerce complemento para WordPress anterior a 1.1.8 no verifican correctamente si hay CSRF al crear y eliminar roles de Customer, lo que permite a los atacantes iniciar sesión Los administradores crean y eliminan roles personalizados arbitrarios mediante ataques CSRF.

The Booster plugins (Booster, Booster Plus, and Booster Elite) for WordPress are vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.6.6 (Booster), 5.6.5 (Plus), and 1.1.7 (Elite). This is due to missing or incorrect nonce validation on functions such as 'process_actions' and 'get_delete_all_custom_statuses_button'. This makes it possible for unauthenticated attackers to create and delete arbitrary custom roles via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.  

*Credits: WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-11-16 CVE Reserved
  • 2022-11-21 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 1.1.8
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 1.1.8"
elite, wordpress
Affected
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 5.6.6
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 5.6.6"
plus, wordpress
Affected
Booster
Search vendor "Booster"
Booster For Woocommerce
Search vendor "Booster" for product "Booster For Woocommerce"
< 5.6.7
Search vendor "Booster" for product "Booster For Woocommerce" and version " < 5.6.7"
wordpress
Affected