CVE-2023-4500

The Order Tracking Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the order status parameter in versions up to, and including, 3.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers (admin or higher) to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:etoilewebdesign:order_tracking:*:*:*:*:pro:wordpress:*:*

History

08 Apr 2026, 18:18

Type Values Removed Values Added
CWE CWE-79
Summary
  • (es) El plugin Order Tracking Pro para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro de estado del pedido en versiones hasta la 3.3.6, inclusive, debido a la sanitización insuficiente de la entrada y al escape de la salida. Esto permite a atacantes autenticados (administrador o superior) inyectar scripts web arbitrarios en páginas que se ejecutan si logran engañar a un usuario para que realice una acción como hacer clic en un enlace. Esto solo afecta a las instalaciones multisitio y a las instalaciones donde se ha deshabilitado unfiltered_html.

21 Nov 2024, 08:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.8
v2 : unknown
v3 : 4.7
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2959453%40order-tracking%2Ftrunk&old=2949611%40order-tracking%2Ftrunk&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2959453%40order-tracking%2Ftrunk&old=2949611%40order-tracking%2Ftrunk&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3?source=cve - Third Party Advisory

07 Nov 2023, 04:22

Type Values Removed Values Added
CWE CWE-79

01 Sep 2023, 20:51

Type Values Removed Values Added
CPE cpe:2.3:a:etoilewebdesign:order_tracking:*:*:*:*:pro:wordpress:*:*
CVSS v2 : unknown
v3 : 4.7
v2 : unknown
v3 : 4.8
First Time Etoilewebdesign order Tracking
Etoilewebdesign
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/81f9a4c6-971f-4f6d-8bb1-e97bf75cf8d3?source=cve - Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2959453%40order-tracking%2Ftrunk&old=2949611%40order-tracking%2Ftrunk&sfp_email=&sfph_mail= - (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2959453%40order-tracking%2Ftrunk&old=2949611%40order-tracking%2Ftrunk&sfp_email=&sfph_mail= - Patch

31 Aug 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-31 06:15

Updated : 2026-04-08 18:18


NVD link : CVE-2023-4500

Mitre link : CVE-2023-4500

CVE.ORG link : CVE-2023-4500


JSON object : View

Products Affected

etoilewebdesign

  • order_tracking
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')