First published: Thu Aug 31 2023(Updated: )
The Order Tracking Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the start_date and end_date parameters in versions up to, and including, 3.3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Etoilewebdesign Order Tracking | <=3.3.6 | |
<=3.3.6 |
https://plugins.trac.wordpress.org/browser/order-tracking/trunk/includes/Export.class.php#L158
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-4471.
The severity of CVE-2023-4471 is medium with a CVSS score of 6.1.
Versions up to, and including, 3.3.6 of the Order Tracking Pro plugin for WordPress are affected by CVE-2023-4471.
The CWE category for CVE-2023-4471 is CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')).
The vulnerability can be exploited by unauthenticated attackers injecting arbitrary JavaScript code via the start_date and end_date parameters.