Description
The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function, PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.
Published: 2025-12-24
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Print Invoice & Delivery Notes for WooCommerce plugin contains an unauthenticated code injection vulnerability due to a missing capability check in its update routine, PHP execution enabled inside the Dompdf library, and lack of escaping in its template. This flaw is a CWE-94 injection that allows an attacker to inject and execute arbitrary PHP code when a PDF is requested. Based on the description, the likely attack vector is an unauthenticated HTTP request to the update endpoint that triggers PDF generation.

Affected Systems

Tyche Softwares publishes the Print Invoice & Delivery Notes for WooCommerce plugin for WordPress. All releases up to and including 5.8.0 are affected; the vulnerability is present in the ‘update’ function of the plugin. The vendor has released newer versions that address the issue, but the CVE entry does not list a specific patched version.

Risk and Exploitability

The CVSS score of 9.8 marks this as a critical severity flaw, but the EPSS score of less than 1% indicates a very low probability of active exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw is unauthenticated, no special privileges are required; an attacker can trigger the code execution simply by sending the crafted request to the vulnerable endpoint. Thus, the risk is high if the plugin is present, but the practical exploit likelihood remains low without visible attacks.

Generated by OpenCVE AI on April 21, 2026 at 16:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Print Invoice & Delivery Notes for WooCommerce plugin to the latest version released by Tyche Softwares, which removes the capability check bug and disables PHP execution in the PDF generator.
  • If an upgrade cannot be performed immediately, permanently deactivate or uninstall the plugin to eliminate the attack surface.
  • As a temporary workaround, restrict the ‘update’ hook to users with the capability to edit plugin options or remove the hook altogether, ensuring that only authorized administrators can trigger PDF generation.

Generated by OpenCVE AI on April 21, 2026 at 16:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 24 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Tychesoftwares
Tychesoftwares print Invoice & Delivery Notes For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Tychesoftwares
Tychesoftwares print Invoice & Delivery Notes For Woocommerce
Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function, PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.
Title Print Invoice & Delivery Notes for WooCommerce <= 5.8.0 - Unauthenticated Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Tychesoftwares Print Invoice & Delivery Notes For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:46.005Z

Reserved: 2025-11-28T05:56:13.257Z

Link: CVE-2025-13773

cve-icon Vulnrichment

Updated: 2025-12-24T14:17:01.836Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T05:16:05.320

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses