Popular Plugin for WooCommerce Patches Vulnerability


The Fashionable WooCommerce Booster plugin patched a Mirrored Cross-Web site Scripting vulnerability, affecting as much as 70,000+ web sites utilizing the plugin.

Booster for WooCommerce Vulnerability

Booster for WooCommerce is a well-liked all-in-one WordPress plugin that provides over 100 capabilities for customizing WooCommerce shops.

The modular bundle gives the entire most important functionalities essential to run an ecommerce retailer corresponding to a customized cost gateways, purchasing cart customization, and customised value labels and buttons.

Mirrored Cross Web site Scripting (XSS)

A mirrored cross-site scripting vulnerability on WordPress usually occurs when an enter expects one thing particular (like a picture add or textual content) however permits different inputs, together with malicious scripts.

An attacker can then execute scripts on a website customer’s browser.

If the person is an admin then there generally is a potential for the attacker stealing the admin credentials and taking up the positioning.

The non-profit Open Net Utility Safety Challenge (OWASP) describes this sort of vulnerability:

“Mirrored assaults are these the place the injected script is mirrored off the net server, corresponding to in an error message, search outcome, or another response that features some or the entire enter despatched to the server as a part of the request.

Mirrored assaults are delivered to victims by way of one other route, corresponding to in an e-mail message, or on another web site.

…XSS may cause a wide range of issues for the top person that vary in severity from an annoyance to finish account compromise.”

As of this time the vulnerability has not been assigned a severity score.

That is the official description of the vulnerability by the U.S. Authorities Nationwide Vulnerability Database:

“The Booster for WooCommerce WordPress plugin earlier than 5.6.3, Booster Plus for WooCommerce WordPress plugin earlier than 6.0.0, Booster Elite for WooCommerce WordPress plugin earlier than 6.0.0 don’t escape some URLs and parameters earlier than outputting them again in attributes, resulting in Mirrored Cross-Web site Scripting.”

What which means is that the vulnerability includes a failure to “escape some URLs,” which suggests to encode them in particular characters (referred to as ASCII).

Escaping URLs means encoding URLs in an anticipated format. So if a URL with a clean house is encountered a web site might encoded that URL utilizing the ASCII characters “%20” to characterize the encoded clean house.

It’s this failure to correctly encode URLs which permits an attacker to enter one thing else, presumably a malicious script though it may very well be one thing else like a redirection to malicious website.

Changelog Information Vulnerabilities

The plugins official log of software program updates (referred to as a Changelog) makes reference to a Cross Web site Request Forgery vulnerability.

The free Booster for WooCommerce plugin changelog accommodates the next notation for model 6.0.1:

“FIXED – EMAILS & MISC. – Normal – Mounted CSRF challenge for Booster Person Roles Changer.

FIXED – Added Safety vulnerability fixes.”

Customers of the plugin ought to contemplate updating to the very newest model of the plugin.


Learn the advisory on the U.S. Authorities Nationwide Vulnerability Database

CVE-2022-4227 Element

Learn a abstract of the vulnerability on the WPScan web site

Booster for WooCommerce – Mirrored Cross-Web site Scripting

Featured picture by Shutterstock/Asier Romero


Scroll to Top