{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3763","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","dateUpdated":"2025-04-30T15:37:34.468Z","dateReserved":"2022-10-31T00:00:00.000Z","datePublished":"2022-11-21T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-11-29T13:40:38.833Z"},"title":"Booster for WooCommerce - Checkout Files Deletion via CSRF","problemTypes":[{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Booster for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"5.6.7"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"},{"vendor":"Unknown","product":"Booster Plus for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"5.6.5"}],"defaultStatus":"unaffected"},{"vendor":"Unknown","product":"Booster Elite for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.1.7"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not have CSRF check in place when deleting files uploaded at the checkout, allowing attackers to make a logged in shop manager or admin delete them via a CSRF attack"}],"references":[{"url":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"WPScan","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:20:58.275Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/7ab15530-8321-487d-97a5-1469b51fcc3f","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.1,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-30T15:36:55.342783Z","id":"CVE-2022-3763","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-30T15:37:34.468Z"}}]}}