Vulnerabilities and security researches forwoocommerce-jetpack woocommerce-jetpack
Direction: ascendingJun 07, 2024
Booster for WooCommerce # CVE-2022-3763
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 21, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2021-34646
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 31, 2021
- Research Description
- Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2021-24999
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 03, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_notice parameter before outputting it back in the admin dashboard when the Pdf Invoicing module is enabled, leading to a Reflected Cross-Site Scripting
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2021-25000
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 03, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_delete_role parameter before outputting back in the admin dashboard when the General module is enabled, leading to a Reflected Cross-Site Scripting issue
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2018-20966
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 12, 2019
- Research Description
- The woocommerce-jetpack plugin before 3.8.0 for WordPress has XSS in the Products Per Page feature.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2022-41805
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2022
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Booster for WooCommerce plugin <= 5.6.6 on WordPress.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2021-25001
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 03, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_create_products_xml_result parameter before outputting back in the admin dashboard when the Product XML Feeds module is enabled, leading to a Reflected Cross-Site Scripting issue
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2022-3762
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 21, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite)
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2022-4016
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 12, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.6, Booster Elite for WooCommerce WordPress plugin before 1.1.8 does not properly check for CSRF when creating and deleting Customer roles, allowing attackers to make logged admins create and delete arbitrary custom roles via CSRF attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2022-4227
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 26, 2022
- Research Description
- The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2022-4017
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 23, 2023
- Research Description
- The Booster for WooCommerce WordPress plugin before 6.0.1, Booster Plus for WooCommerce WordPress plugin before 6.0.1, Booster Elite for WooCommerce WordPress plugin before 6.0.1 have either flawed CSRF checks or are missing them completely in numerous places, allowing attackers to make logged in users perform unwanted actions via CSRF attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2024-1534
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 07, 2024
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 7.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2024-29760
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 27, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluggabl LLC Booster for WooCommerce allows Reflected XSS.This issue affects Booster for WooCommerce: from n/a through 7.1.7.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2024-3957
- CVE, Research URL
- Home page URL
- Application
- Date
- May 02, 2024
- Research Description
- The Booster for WooCommerce plugin is vulnerable to Unauthenticated Arbitrary Shortcode Execution in versions up to, and including, 7.1.8. This allows unauthenticated attackers to execute arbitrary shortcodes. The severity and exploitability depends on what other plugins are installed and what shortcode functionality they provide.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-48333
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 30, 2023
- Research Description
- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce.This issue affects Booster for WooCommerce: from n/a through 7.1.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-48747
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 04, 2024
- Research Description
- Improper Authentication vulnerability in Pluggabl LLC Booster for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booster for WooCommerce: from n/a through 7.1.2.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2024-1054
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 29, 2024
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wcj_product_barcode' shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes like 'color'. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-5638
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 19, 2023
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcj_image' shortcode in versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2024-1986
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 08, 2024
- Research Description
- The Booster Elite for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the wc_add_new_product() function in all versions up to, and including, 7.1.7. This makes it possible for customer-level attackers, and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable when the user product upload functionality is enabled.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-4796
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 20, 2023
- Research Description
- The Booster for WooCommerce for WordPress is vulnerable to Information Disclosure via the 'wcj_wp_option' shortcode in versions up to, and including, 7.1.0 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive site options.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-4945
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 14, 2023
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes in versions up to, and including, 7.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Booster for WooCommerce # CVE-2023-40002
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 23, 2023
- Research Description
- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce plugin <= 7.1.1 versions.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Nov 21, 2024
Booster for WooCommerce # CVE-2024-9239
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 20, 2024
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Nov 27, 2024
Booster for WooCommerce # CVE-2024-9170
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 26, 2024
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wcj_product_meta shortcode in all versions up to, and including, 7.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with ShopManager-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 02, 2025
Booster for WooCommerce # CVE-2024-12278
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 01, 2025
- Research Description
- The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable