Show filters
100 Total Results
Displaying 1-10 of 100
Sort by:
Attacker Value
Unknown

CVE-2024-13511

Disclosure Date: January 23, 2025 (last updated February 06, 2025)
The Variation Swatches for WooCommerce plugin, in all versions starting at 1.0.8 up until 1.3.2, contains a vulnerability due to improper nonce verification in its settings reset functionality. The issue exists in the settings_init() function, which processes a reset action based on specific query parameters in the URL. The related delete_settings() function performs a faulty nonce validation check, making the reset operation insecure and susceptible to unauthorized access.
Attacker Value
Unknown

CVE-2023-48274

Disclosure Date: December 09, 2024 (last updated December 21, 2024)
Missing Authorization vulnerability in Mondial Relay WooCommerce - WCMultiShipping WCMultiShipping allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCMultiShipping: from n/a through 2.3.5.
0
Attacker Value
Unknown

CVE-2024-10049

Disclosure Date: October 18, 2024 (last updated October 30, 2024)
The Edit WooCommerce Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘page’ parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2020-36841

Disclosure Date: October 16, 2024 (last updated January 06, 2025)
The WooCommerce Smart Coupons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the woocommerce_coupon_admin_init function in versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to send themselves gift certificates of any value, which could be redeemed for products sold on the victim’s storefront.
0
Attacker Value
Unknown

CVE-2024-9944

Disclosure Date: October 15, 2024 (last updated October 18, 2024)
The WooCommerce plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 9.0.2. This is due to the plugin not properly neutralizing HTML elements from submitted order forms. This makes it possible for unauthenticated attackers to inject arbitrary HTML that will render when the administrator views order form submissions.
Attacker Value
Unknown

CVE-2023-35049

Disclosure Date: June 19, 2024 (last updated June 20, 2024)
Missing Authorization vulnerability in WooCommerce WooCommerce Stripe Payment Gateway.This issue affects WooCommerce Stripe Payment Gateway: from n/a through 7.4.0.
0
Attacker Value
Unknown

CVE-2023-51497

Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Ship to Multiple Addresses.This issue affects WooCommerce Ship to Multiple Addresses: from n/a through 3.8.9.
Attacker Value
Unknown

CVE-2023-51496

Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.
Attacker Value
Unknown

CVE-2023-51495

Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.
Attacker Value
Unknown

CVE-2024-37297

Disclosure Date: June 12, 2024 (last updated July 24, 2024)
WooCommerce is an open-source e-commerce platform built on WordPress. A vulnerability introduced in WooCommerce 8.8 allows for cross-site scripting. A bad actor can manipulate a link to include malicious HTML & JavaScript content. While the content is not saved to the database, the links may be sent to victims for malicious purposes. The injected JavaScript could hijack content & data stored in the browser, including the session. The URL content is read through the `Sourcebuster.js` library and then inserted without proper sanitization to the classic checkout and registration forms. Versions 8.8.5 and 8.9.3 contain a patch for the issue. As a workaround, one may disable the Order Attribution feature.