Vulnerabilities and security researches forkadence-woocommerce-email-designer kadence-woocommerce-email-designer
Direction: ascendingJun 07, 2024
Kadence WooCommerce Email Designer # CVE-2023-47186
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 06, 2023
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Kadence WP Kadence WooCommerce Email Designer plugin <= 1.5.11 versions.
- Affected versions
-
max 1.5.12.
- Status
-
vulnerable
Kadence WooCommerce Email Designer # CVE-2022-3335
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 25, 2022
- Research Description
- The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
- Affected versions
-
max 1.5.12.
- Status
-
vulnerable
Apr 17, 2025
Kadence WooCommerce Email Designer # CVE-2025-39557
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 16, 2025
- Research Description
- Unrestricted Upload of File with Dangerous Type vulnerability in Ben Ritner - Kadence WP Kadence WooCommerce Email Designer allows Upload a Web Shell to a Web Server. This issue affects Kadence WooCommerce Email Designer: from n/a through 1.5.14.
- Affected versions
-
max 1.5.15.
- Status
-
vulnerable
Aug 16, 2025
Kadence WooCommerce Email Designer # CVE-2025-54697
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 14, 2025
- Research Description
- Incorrect Privilege Assignment vulnerability in Ben Ritner - Kadence WP Kadence WooCommerce Email Designer allows Privilege Escalation. This issue affects Kadence WooCommerce Email Designer: from n/a through 1.5.16.
- Affected versions
-
max 1.5.16.
- Status
-
vulnerable
Dec 10, 2025
Kadence WooCommerce Email Designer # CVE-2025-13387
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 02, 2025
- Research Description
- The Kadence WooCommerce Email Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer name in all versions up to, and including, 1.5.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 1.5.18.
- Status
-
vulnerable