The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/50963747-ae8e-42b4-bb42-cc848be7b92e/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-01-16 16:15
Updated : 2024-01-22 19:50
NVD link : CVE-2023-0479
Mitre link : CVE-2023-0479
CVE.ORG link : CVE-2023-0479
JSON object : View
Products Affected
tychesoftwares
- print_invoice_\&_delivery_notes_for_woocommerce
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')