Home

Description

The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function, PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.

PUBLISHED Reserved 2025-11-28 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-23:Disclosed

Credits

Angus Girvan finder

Marcin Dudek finder

References

www.wordfence.com/...-2414-4d6f-bf43-9c5b65ebf769?source=cve

plugins.trac.wordpress.org/...119/woocommerce-delivery-notes

plugins.trac.wordpress.org/...woocommerce-delivery-notes.php

plugins.trac.wordpress.org/...woocommerce-delivery-notes.php

plugins.trac.wordpress.org/...df/simple/invoice/template.php

plugins.trac.wordpress.org/.../front/wcdn-front-function.php

plugins.trac.wordpress.org/...df/dompdf/src/PhpEvaluator.php

cve.org (CVE-2025-13773)

nvd.nist.gov (CVE-2025-13773)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.