Vulnerabilities and security researches forbiteship biteship
Direction: ascendingJun 07, 2024
Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2024-24866
- CVE, Research URL
- Date
- Feb 05, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Reflected XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2023-6278
- CVE, Research URL
- Date
- Jan 29, 2024
- Research Description
- The Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo WordPress plugin before 2.2.25 does not sanitise and escape the biteship_error and biteship_message parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2023-49767
- CVE, Research URL
- Date
- Dec 15, 2023
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Biteship Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo allows Stored XSS.This issue affects Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo: from n/a through 2.2.24.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 19, 2025
Biteship: Plugin Ongkos Kirim Kurir Instant, Reguler, Kargo # CVE-2025-5816
- CVE, Research URL
- Date
- Jul 18, 2025
- Research Description
- The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's orders.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable