The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function, PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 24 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tychesoftwares
Tychesoftwares print Invoice & Delivery Notes For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Tychesoftwares
Tychesoftwares print Invoice & Delivery Notes For Woocommerce Wordpress Wordpress wordpress |
Wed, 24 Dec 2025 04:45:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-24T14:17:05.956Z
Reserved: 2025-11-28T05:56:13.257Z
Link: CVE-2025-13773
Updated: 2025-12-24T14:17:01.836Z
Status : Received
Published: 2025-12-24T05:16:05.320
Modified: 2025-12-24T05:16:05.320
Link: CVE-2025-13773
No data.
OpenCVE Enrichment
Updated: 2025-12-24T11:51:01Z
Weaknesses