The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/90d3022c-5d35-4ef2-ab87-6919268db890 | Third Party Advisory |
https://wpscan.com/vulnerability/90d3022c-5d35-4ef2-ab87-6919268db890 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/90d3022c-5d35-4ef2-ab87-6919268db890 - Third Party Advisory |
07 Nov 2023, 03:57
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2022-12-26 13:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4227
Mitre link : CVE-2022-4227
CVE.ORG link : CVE-2022-4227
JSON object : View
Products Affected
booster
- booster_for_woocommerce
- booster_plus_for_woocommerce
- booster_elite_for_woocommerce
CWE
No CWE.