Description
WordPress Plugin Booster for WooCommerce is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Booster for WooCommerce version 3.0.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.1.0 or latest
References
Related Vulnerabilities
TYPO3 Insufficient Session Expiration Vulnerability (CVE-2022-31050)
WordPress Plugin WP with Spritz Local/Remote File Inclusion (1.0)
Joomla! Core 1.0.x Multiple Vulnerabilities (1.0.0 - 1.0.9)
Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5321)
WordPress Plugin Htaccess by BestWebSoft Cross-Site Scripting (1.4)