The Popular WooCommerce Booster plugin covered a Reflected Cross-Site Scripting vulnerability, affecting as much as 70,000+ sites utilizing the plugin.
Booster for WooCommerce Vulnerability
Booster for WooCommerce is a popular all-in-one WordPress plugin that offers over 100 functions for personalizing WooCommerce shops.
The modular bundle offers all of the most vital functionalities needed to run an ecommerce shop such as a customized payment entrances, shopping cart customization, and customized rate labels and buttons.
Shown Cross Website Scripting (XSS)
A showed cross-site scripting vulnerability on WordPress typically occurs when an input anticipates something particular (like an image upload or text) however enables other inputs, including destructive scripts.
An opponent can then carry out scripts on a site visitor’s internet browser.
If the user is an admin then there can be a potential for the assailant taking the admin qualifications and taking control of the site.
The non-profit Open Web Application Security Task (OWASP) explains this sort of vulnerability:
“Reflected attacks are those where the injected script is shown off the web server, such as in an error message, search results page, or any other reaction that consists of some or all of the input sent to the server as part of the request.
Shown attacks are delivered to victims via another route, such as in an e-mail message, or on some other site.
… XSS can cause a variety of problems for the end user that vary in severity from an annoyance to finish account compromise.”
Since this time the vulnerability has not been designated an intensity ranking.
This is the official description of the vulnerability by the U.S. Federal Government National Vulnerability Database:
“The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not leave some URLs and criteria prior to outputting them back in characteristics, resulting in Reflected Cross-Site Scripting.”
What that indicates is that the vulnerability includes a failure to “leave some URLs,” which implies to encode them in unique characters (called ASCII).
Getting away URLs means encoding URLs in an expected format. So if a URL with a blank area is encountered a site might encoded that URL utilizing the ASCII characters “%20” to represent the encoded blank space.
It’s this failure to correctly encode URLs which allows an enemy to input something else, most likely a destructive script although it might be something else like a redirection to harmful website.
Changelog Records Vulnerabilities
The plugins official log of software updates (called a Changelog) makes reference to a Cross Website Request Forgery vulnerability.
The free Booster for WooCommerce plugin changelog contains the following notation for version 6.0.1:
“FIXED– EMAILS & MISC.– General– Repaired CSRF issue for Booster User Roles Changer.
REPAIRED– Added Security vulnerability fixes.”
Users of the plugin ought to think about upgrading to the extremely most current variation of the plugin.
Check out the advisory at the U.S. Government National Vulnerability Database
Check out a summary of the vulnerability at the WPScan website
Booster for WooCommerce– Reflected Cross-Site Scripting
Included image by Best SMM Panel/Asier Romero