CVE-2020-36731
Plain English Summary
AI-powered analysis for quick understanding
An attacker can change the plugin settings without needing to log in, which could lead to malicious changes or even inject harmful scripts that affect users. This vulnerability affects versions up to 2.3.1 of the Flexible Checkout Fields for WooCommerce plugin and arises from a lack of proper checks and safeguards when updating settings.
Technical Description
The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jun 7, 2023
almost 3 years ago
Last Modified
Mar 12, 2026
27 days ago
Vendor
wpdesk
Product
flexible checkout fields