Vulnerabilities and security researches foradvanced-woo-labels advanced-woo-labels
Direction: ascendingJun 10, 2024
Advanced Woo Labels – Product Labels for WooCommerce # CVE-2024-35675
- CVE, Research URL
- Date
- Jun 08, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Cross-Site Scripting (XSS).This issue affects Advanced Woo Labels: from n/a through 1.93.
- Affected versions
-
max 1.94.
- Status
-
vulnerable
Oct 04, 2024
Advanced Woo Labels – Product Labels for WooCommerce # CVE-2024-47622
- CVE, Research URL
- Date
- Oct 05, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Stored XSS.This issue affects Advanced Woo Labels: from n/a through 2.01.
- Affected versions
-
max 2.02.
- Status
-
vulnerable
Apr 06, 2025
Advanced Woo Labels – Product Labels for WooCommerce # CVE-2025-32188
- CVE, Research URL
- Date
- Apr 04, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Stored XSS. This issue affects Advanced Woo Labels: from n/a through 2.14.
- Affected versions
-
max 2.14.
- Status
-
vulnerable
Mar 29, 2026
Advanced Woo Labels – Product Labels for WooCommerce # CVE-2026-32414
- CVE, Research URL
- Date
- Mar 14, 2026
- Research Description
- Improper Control of Generation of Code ('Code Injection') vulnerability in ILLID Advanced Woo Labels advanced-woo-labels allows Remote Code Inclusion.This issue affects Advanced Woo Labels: from n/a through <= 2.36.
- Affected versions
-
max 2.36.
- Status
-
vulnerable
Apr 15, 2026
Advanced Woo Labels – Product Labels for WooCommerce # CVE-2026-1929
- CVE, Research URL
- Date
- Feb 25, 2026
- Research Description
- The Advanced Woo Labels plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.37. This is due to the use of `call_user_func_array()` with user-controlled callback and parameters in the `get_select_option_values()` AJAX handler without an allowlist of permitted callbacks or a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP functions and operating system commands on the server via the 'callback' parameter.
- Affected versions
-
max 2.37.
- Status
-
vulnerable