CVE-2020-36731

Medium
|6.1
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

An attacker can change the plugin settings without needing to log in, which could lead to malicious changes or even inject harmful scripts that affect users. This vulnerability affects versions up to 2.3.1 of the Flexible Checkout Fields for WooCommerce plugin and arises from a lack of proper checks and safeguards when updating settings.

Technical Description

The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 1009 days

Quick Information

Published

Jun 7, 2023

almost 3 years ago

Last Modified

Mar 12, 2026

27 days ago

Vendor

wpdesk

Product

flexible checkout fields