Popular Plugin for WooCommerce Patches Vulnerability

Posted by

The Popular WooCommerce Booster plugin covered a Shown Cross-Site Scripting vulnerability, impacting approximately 70,000+ sites utilizing the plugin.

Booster for WooCommerce Vulnerability

Booster for WooCommerce is a popular all-in-one WordPress plugin that offers over 100 functions for customizing WooCommerce shops.

The modular package provides all of the most vital performances essential to run an ecommerce store such as a custom payment gateways, shopping cart personalization, and personalized rate labels and buttons.

Shown Cross Website Scripting (XSS)

A showed cross-site scripting vulnerability on WordPress usually occurs when an input anticipates something particular (like an image upload or text) but allows other inputs, including harmful scripts.

An assailant can then carry out scripts on a site visitor’s web browser.

If the user is an admin then there can be a capacity for the opponent stealing the admin qualifications and taking over the site.

The non-profit Open Web Application Security Project (OWASP) explains this sort of vulnerability:

“Shown attacks are those where the injected script is reflected off the web server, such as in a mistake message, search engine result, or any other reaction that consists of some or all of the input sent to the server as part of the request.

Shown attacks are delivered to victims by means of another route, such as in an e-mail message, or on some other website.

… XSS can trigger a variety of issues for the end user that vary in seriousness from an inconvenience to finish account compromise.”

Since this time the vulnerability has actually not been assigned a seriousness rating.

This is the main description of the vulnerability by the U.S. Federal Government National Vulnerability Database:

“The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin prior to 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Shown Cross-Site Scripting.”

What that suggests is that the vulnerability includes a failure to “get away some URLs,” which suggests to encode them in special characters (called ASCII).

Escaping URLs implies encoding URLs in an expected format. So if a URL with a blank area is come across a site may encoded that URL using the ASCII characters “%20” to represent the encoded blank area.

It’s this failure to properly encode URLs which allows an assailant to input something else, most likely a destructive script although it might be something else like a redirection to malicious website.

Changelog Records Vulnerabilities

The plugins main log of software updates (called a Changelog) refers to a Cross Site Demand Forgery vulnerability.

The complimentary Booster for WooCommerce plugin changelog contains the following notation for version 6.0.1:

“REPAIRED– EMAILS & MISC.– General– Repaired CSRF concern for Booster User Roles Changer.

REPAIRED– Included Security vulnerability repairs.”

Users of the plugin should consider updating to the extremely most current version of the plugin.

Citations

Read the advisory at the U.S. Federal Government National Vulnerability Database

CVE-2022-4227 Information

Check out a summary of the vulnerability at the WPScan website

Booster for WooCommerce– Shown Cross-Site Scripting

Included image by Best SMM Panel/Asier Romero