cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forbiteship biteship

Direction: ascending
Jun 07, 2024

Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2024-24866

CVE, Research URL

CVE-2024-24866

Date
Feb 05, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Reflected XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
Affected versions
Min -, max -.
Status
vulnerable

Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2023-6278

CVE, Research URL

CVE-2023-6278

Date
Jan 29, 2024
Research Description
The Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo WordPress plugin before 2.2.25 does not sanitise and escape the biteship_error and biteship_message parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected versions
Min -, max -.
Status
vulnerable

Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2023-49767

CVE, Research URL

CVE-2023-49767

Date
Dec 15, 2023
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Stored XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
Affected versions
Min -, max -.
Status
vulnerable
Jul 19, 2025

Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2025-5816

CVE, Research URL

CVE-2025-5816

Date
Jul 18, 2025
Research Description
The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's orders.
Affected versions
Min -, max -.
Status
vulnerable