Vulnerability Description
The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Booster | Booster Elite For Woocommerce | < 6.0.0 |
| Booster | Booster For Woocommerce | < 5.6.3 |
| Booster | Booster Plus For Woocommerce | < 6.0.0 |
References
- https://wpscan.com/vulnerability/90d3022c-5d35-4ef2-ab87-6919268db890Third Party Advisory
- https://wpscan.com/vulnerability/90d3022c-5d35-4ef2-ab87-6919268db890Third Party Advisory
FAQ
What is CVE-2022-4227?
CVE-2022-4227 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some UR...
How severe is CVE-2022-4227?
CVE-2022-4227 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4227?
Check the references section above for vendor advisories and patch information. Affected products include: Booster Booster Elite For Woocommerce, Booster Booster For Woocommerce, Booster Booster Plus For Woocommerce.