Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12531 | The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding. |
Fri, 20 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-06-20T16:59:19.436Z
Reserved: 2023-01-24T18:43:22.807Z
Link: CVE-2023-0479
Updated: 2024-08-02T05:10:56.345Z
Status : Modified
Published: 2024-01-16T16:15:10.580
Modified: 2025-06-20T17:15:29.637
Link: CVE-2023-0479
No data.
OpenCVE Enrichment
No data.
EUVD