Vulnerabilities (CVE)

Filtered by vendor Booster Subscribe
Filtered by product Booster For Woocommerce
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-48333 1 Booster 1 Booster For Woocommerce 2023-12-06 N/A 6.5 MEDIUM
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce.This issue affects Booster for WooCommerce: from n/a through 7.1.1.
CVE-2023-40002 1 Booster 1 Booster For Woocommerce 2023-11-28 N/A 6.5 MEDIUM
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce plugin <= 7.1.1 versions.
CVE-2021-25001 1 Booster 1 Booster For Woocommerce 2022-01-08 2.6 LOW 6.1 MEDIUM
The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_create_products_xml_result parameter before outputting back in the admin dashboard when the Product XML Feeds module is enabled, leading to a Reflected Cross-Site Scripting issue
CVE-2021-25000 1 Booster 1 Booster For Woocommerce 2022-01-08 2.6 LOW 6.1 MEDIUM
The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_delete_role parameter before outputting back in the admin dashboard when the General module is enabled, leading to a Reflected Cross-Site Scripting issue
CVE-2021-24999 1 Booster 1 Booster For Woocommerce 2022-01-08 2.6 LOW 6.1 MEDIUM
The Booster for WooCommerce WordPress plugin before 5.4.9 does not sanitise and escape the wcj_notice parameter before outputting it back in the admin dashboard when the Pdf Invoicing module is enabled, leading to a Reflected Cross-Site Scripting
CVE-2021-34646 1 Booster 1 Booster For Woocommerce 2021-09-08 7.5 HIGH 9.8 CRITICAL
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
CVE-2018-20966 1 Booster 1 Booster For Woocommerce 2019-08-15 4.3 MEDIUM 6.1 MEDIUM
The woocommerce-jetpack plugin before 3.8.0 for WordPress has XSS in the Products Per Page feature.