CVE-2023-0479

The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:tychesoftwares:print_invoice_\&_delivery_notes_for_woocommerce:*:*:*:*:*:wordpress:*:*

History

22 Jan 2024, 19:50

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 16:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-0479

Mitre link : CVE-2023-0479

CVE.ORG link : CVE-2023-0479


JSON object : View

Products Affected

tychesoftwares

  • print_invoice_\&_delivery_notes_for_woocommerce
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')