CVE-2020-36731
HIGH EXPLOITED NUCLEIWooCommerce <2.3.1 - XSS
Title source: llmDescription
The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.
Nuclei Templates (1)
Flexible Checkout Fields for WooCommerce <= 2.3.1 - Unauthenticated Arbitrary Plugin Settings Update
HIGHby popcorn94
FOFA:
body="/wp-content/plugins/flexible-checkout-fields/"
References (3)
Scores
CVSS v3
7.2
EPSS
0.1947
EPSS Percentile
95.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Details
VulnCheck KEV
2020-02-27
CWE
CWE-79
Status
published
Products (3)
wpdesk/flexible_checkout_fields
< 2.3.1
wpdesk/flexible_checkout_fields_for_woocommerce
< 2.3.1
wpdesk/Flexible Checkout Fields for WooCommerce – WooCommerce Checkout Manager
< 2.3.2
Published
Jun 07, 2023
Tracked Since
Feb 18, 2026