Skip to main content

CVE-2022-3762: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Unknown Booster for WooCommerce

Medium
VulnerabilityCVE-2022-3762cvecve-2022-3762cwe-22
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Booster for WooCommerce

Description

The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite)

AI-Powered Analysis

AILast updated: 06/25/2025, 08:30:11 UTC

Technical Analysis

CVE-2022-3762 is a path traversal vulnerability (CWE-22) affecting the Booster for WooCommerce WordPress plugin and its variants (Booster Plus and Booster Elite) prior to versions 5.6.7, 5.6.5, and 1.1.7 respectively. The vulnerability arises because the plugin does not properly validate file paths in certain modules responsible for file downloads. This flaw allows users with ShopManager or Admin privileges to download arbitrary files from the server, bypassing intended access restrictions. Notably, this can occur even in multisite WordPress installations where stricter file access controls are expected. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges at the level of ShopManager or Admin (PR:L), but no user interaction (UI:N) is needed. The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. Exploitation would allow an attacker with elevated privileges to read sensitive files on the server, potentially exposing credentials, configuration files, or other sensitive data. There are no known exploits in the wild as of the publication date (November 21, 2022). No official patches or vendor information is provided in the data, but fixed versions are indicated by version numbers above the affected ones. This vulnerability is significant in environments where multiple users have ShopManager or Admin roles, especially in multisite setups where file access boundaries are critical. Since the flaw requires authenticated access with elevated privileges, it is not exploitable by unauthenticated attackers, but insider threats or compromised accounts pose a risk. The lack of user interaction simplifies exploitation once privileges are obtained. Overall, this vulnerability highlights the importance of strict input validation for file operations in WordPress plugins handling e-commerce functionalities.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Booster plugin, this vulnerability poses a confidentiality risk. Attackers or malicious insiders with ShopManager or Admin access could exfiltrate sensitive files such as customer data, payment information, or internal configuration files. This could lead to data breaches subject to GDPR regulations, resulting in legal and financial penalties. Multisite WordPress installations, common in large enterprises or agencies managing multiple stores, are particularly vulnerable due to the bypass of file access restrictions. The exposure of sensitive files could also facilitate further attacks, such as credential theft or lateral movement within the network. Although the vulnerability does not directly affect integrity or availability, the confidentiality breach alone can severely damage organizational reputation and trust. Given the medium CVSS score and the requirement for elevated privileges, the threat is moderate but should not be underestimated in environments with multiple administrators or where account compromise is possible. Organizations in sectors with high regulatory scrutiny (finance, healthcare, retail) should prioritize addressing this vulnerability to avoid compliance violations and data loss.

Mitigation Recommendations

1. Upgrade the Booster for WooCommerce plugin and its variants to versions 5.6.7 (Booster), 5.6.5 (Booster Plus), or 1.1.7 (Booster Elite) or later, where the vulnerability is fixed. 2. Restrict ShopManager and Admin privileges to only trusted personnel and regularly audit user roles to minimize the number of accounts with elevated access. 3. Implement strict monitoring and logging of file download activities within WordPress and server logs to detect unusual access patterns indicative of exploitation attempts. 4. In multisite environments, review and harden file system permissions and WordPress multisite configurations to limit cross-site file access. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts, although this is a secondary control given the need for authentication. 6. Conduct regular security awareness training for administrators to recognize phishing or social engineering attempts that could lead to account compromise. 7. Consider implementing multi-factor authentication (MFA) for all users with ShopManager or Admin roles to reduce the risk of credential misuse. 8. Perform periodic vulnerability scans and penetration tests focusing on WordPress plugins and file access controls to identify residual risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-31T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbede01

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 8:30:11 AM

Last updated: 8/13/2025, 8:55:41 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats