First published: Tue Oct 14 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.2.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the range parameter on the wc-reports page to wp-admin/admin.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Woothemes Woocommerce Plugin | <=2.2.2 | |
Woothemes Woocommerce Plugin | =2.1.0 | |
Woothemes Woocommerce Plugin | =2.1.1 | |
Woothemes Woocommerce Plugin | =2.1.2 | |
Woothemes Woocommerce Plugin | =2.1.3 | |
Woothemes Woocommerce Plugin | =2.1.4 | |
Woothemes Woocommerce Plugin | =2.1.5 | |
Woothemes Woocommerce Plugin | =2.1.6 | |
Woothemes Woocommerce Plugin | =2.1.7 | |
Woothemes Woocommerce Plugin | =2.1.8 | |
Woothemes Woocommerce Plugin | =2.1.9 | |
Woothemes Woocommerce Plugin | =2.1.10 | |
Woothemes Woocommerce Plugin | =2.1.11 | |
Woothemes Woocommerce Plugin | =2.1.12 | |
Woothemes Woocommerce Plugin | =2.2.0 | |
Woothemes Woocommerce Plugin | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6313 is considered a medium severity vulnerability due to its ability to allow remote attackers to execute arbitrary scripts.
To fix CVE-2014-6313, update the WooCommerce plugin to version 2.2.3 or later.
CVE-2014-6313 affects all WooCommerce plugin versions prior to 2.2.3.
Yes, CVE-2014-6313 can be exploited remotely without user interaction through crafted requests.
CVE-2014-6313 is a cross-site scripting (XSS) vulnerability that allows for the injection of arbitrary web scripts or HTML.