CVE-2022-3763: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Booster for WooCommerce
The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack
AI Analysis
Technical Summary
CVE-2022-3763 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting multiple versions of the Booster for WooCommerce WordPress plugin, specifically versions prior to 5.6.7 for Booster for WooCommerce, prior to 5.6.5 for Booster Plus, and prior to 1.1.7 for Booster Elite. The vulnerability arises because these plugin versions lack proper CSRF protections when handling requests to delete files uploaded during the checkout process. This absence of CSRF validation means that an attacker can craft a malicious web request that, when executed by an authenticated user with shop manager or administrator privileges, triggers the deletion of uploaded files without the user’s consent or knowledge. The vulnerability is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as the victim visiting a malicious webpage while logged into the vulnerable WooCommerce site. The impact includes integrity and availability loss, as attackers can delete critical uploaded files, potentially disrupting order processing or causing data loss. The CVSS 3.1 base score is 8.1, reflecting the high impact and relatively low complexity of exploitation. No known exploits in the wild have been reported as of the publication date. The vulnerability is classified under CWE-352, which covers CSRF attacks that exploit the trust a web application places in the user's browser. Since WooCommerce is a widely used e-commerce platform on WordPress, and Booster for WooCommerce is a popular plugin that extends its functionality, this vulnerability poses a significant risk to online shops using these versions. Attackers could leverage this flaw to delete files critical to order fulfillment or customer data, causing operational disruption and potential reputational damage.
Potential Impact
For European organizations operating e-commerce websites using WooCommerce with the affected Booster plugin versions, this vulnerability could lead to unauthorized deletion of uploaded files during checkout, such as customer documents, order attachments, or other critical data. This can disrupt business operations, cause loss of customer trust, and potentially violate data protection regulations like GDPR if personal data is lost or mishandled. The integrity and availability of the e-commerce platform are at risk, potentially leading to financial losses and operational downtime. Since the attack requires a logged-in shop manager or admin to be tricked into visiting a malicious page, insider threat vectors or social engineering could be exploited by attackers. Given the widespread adoption of WooCommerce in Europe, especially among small and medium-sized enterprises, the impact could be significant if not mitigated promptly.
Mitigation Recommendations
European organizations should immediately verify the version of Booster for WooCommerce plugins in use and upgrade to the patched versions: 5.6.7 or later for Booster for WooCommerce, 5.6.5 or later for Booster Plus, and 1.1.7 or later for Booster Elite. If immediate patching is not feasible, organizations should implement compensating controls such as restricting administrative access to trusted networks or VPNs, enforcing multi-factor authentication for admin accounts, and educating shop managers and admins about the risks of clicking unknown links while logged into the admin panel. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like requests targeting file deletion endpoints can reduce risk. Regular backups of uploaded files and order data should be maintained to enable recovery in case of malicious deletion. Monitoring logs for unusual deletion activities and user behavior analytics can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2022-3763: CWE-352 Cross-Site Request Forgery (CSRF) in Unknown Booster for WooCommerce
Description
The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack
AI-Powered Analysis
Technical Analysis
CVE-2022-3763 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting multiple versions of the Booster for WooCommerce WordPress plugin, specifically versions prior to 5.6.7 for Booster for WooCommerce, prior to 5.6.5 for Booster Plus, and prior to 1.1.7 for Booster Elite. The vulnerability arises because these plugin versions lack proper CSRF protections when handling requests to delete files uploaded during the checkout process. This absence of CSRF validation means that an attacker can craft a malicious web request that, when executed by an authenticated user with shop manager or administrator privileges, triggers the deletion of uploaded files without the user’s consent or knowledge. The vulnerability is exploitable remotely over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as the victim visiting a malicious webpage while logged into the vulnerable WooCommerce site. The impact includes integrity and availability loss, as attackers can delete critical uploaded files, potentially disrupting order processing or causing data loss. The CVSS 3.1 base score is 8.1, reflecting the high impact and relatively low complexity of exploitation. No known exploits in the wild have been reported as of the publication date. The vulnerability is classified under CWE-352, which covers CSRF attacks that exploit the trust a web application places in the user's browser. Since WooCommerce is a widely used e-commerce platform on WordPress, and Booster for WooCommerce is a popular plugin that extends its functionality, this vulnerability poses a significant risk to online shops using these versions. Attackers could leverage this flaw to delete files critical to order fulfillment or customer data, causing operational disruption and potential reputational damage.
Potential Impact
For European organizations operating e-commerce websites using WooCommerce with the affected Booster plugin versions, this vulnerability could lead to unauthorized deletion of uploaded files during checkout, such as customer documents, order attachments, or other critical data. This can disrupt business operations, cause loss of customer trust, and potentially violate data protection regulations like GDPR if personal data is lost or mishandled. The integrity and availability of the e-commerce platform are at risk, potentially leading to financial losses and operational downtime. Since the attack requires a logged-in shop manager or admin to be tricked into visiting a malicious page, insider threat vectors or social engineering could be exploited by attackers. Given the widespread adoption of WooCommerce in Europe, especially among small and medium-sized enterprises, the impact could be significant if not mitigated promptly.
Mitigation Recommendations
European organizations should immediately verify the version of Booster for WooCommerce plugins in use and upgrade to the patched versions: 5.6.7 or later for Booster for WooCommerce, 5.6.5 or later for Booster Plus, and 1.1.7 or later for Booster Elite. If immediate patching is not feasible, organizations should implement compensating controls such as restricting administrative access to trusted networks or VPNs, enforcing multi-factor authentication for admin accounts, and educating shop managers and admins about the risks of clicking unknown links while logged into the admin panel. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF-like requests targeting file deletion endpoints can reduce risk. Regular backups of uploaded files and order data should be maintained to enable recovery in case of malicious deletion. Monitoring logs for unusual deletion activities and user behavior analytics can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-31T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbede05
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 7/2/2025, 4:10:47 AM
Last updated: 2/7/2026, 5:46:08 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumCVE-2026-2073: SQL Injection in itsourcecode School Management System
MediumCVE-2026-25845
LowCVE-2026-25844
LowCVE-2026-25843
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.