CVE-2023-52232

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Booster Plus for WooCommerce WordPress plugin. Authenticated users can delete arbitrary posts and pages without proper authorization checks. All WordPress sites running vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Booster Plus for WooCommerce WordPress plugin
Versions: All versions before 7.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce and the Booster Plus plugin installed. Vulnerability is present in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could delete critical website content including posts, pages, and potentially other content types, causing data loss and website disruption.

🟠

Likely Case

Authenticated users with limited privileges (like subscribers or customers) could delete content they shouldn't have access to, potentially removing important website pages or posts.

🟢

If Mitigated

With proper user role management and content backups, impact would be limited to temporary content loss that can be restored.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but minimal technical skill. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.2

Vendor Advisory: https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Booster Plus for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 7.1.2+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched

wp plugin deactivate booster-plus-for-woocommerce

User Role Restrictions

all

Temporarily restrict user capabilities to prevent exploitation

Use WordPress role editor plugins to remove delete capabilities from non-admin users

🧯 If You Can't Patch

  • Implement strict user role management and limit delete capabilities to trusted administrators only
  • Enable comprehensive logging and monitoring of content deletion events

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Booster Plus for WooCommerce → Version. If version is below 7.1.2, you are vulnerable.

Check Version:

wp plugin get booster-plus-for-woocommerce --field=version

Verify Fix Applied:

After updating, verify plugin version shows 7.1.2 or higher in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual post/page deletion events from non-admin users
  • Multiple deletion requests from single user accounts

Network Indicators:

  • POST requests to WordPress admin-ajax.php or admin-post.php with delete actions

SIEM Query:

source="wordpress.log" AND (action="deleted_post" OR action="trashed_post") AND user_role!="administrator"

🔗 References

📤 Share & Export