cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwc-place-order-without-payment wc-place-order-without-payment

Direction: ascending
Jun 07, 2024

Place Order Without Payment for WooCommerce # 47f59ee33113bd4bcc6d8e18f80584a2c1a439d9

Date
Feb 28, 2022
Research Description
Place Order Without Payment for WooCommerce [wc-place-order-without-payment] < 2.5.2 WordPress WC Place Order Without Payment plugin <= 2.1 - Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability discovered in WordPress WC Place Order Without Payment plugin (versions <= 2.1).
Affected versions
max 2.5.2.
Status
vulnerable
Nov 14, 2024

Place Order Without Payment for WooCommerce # CVE-2022-4974

CVE, Research URL

CVE-2022-4974

Date
Oct 16, 2024
Research Description
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Affected versions
max 2.2.
Status
vulnerable
Feb 27, 2025

Place Order Without Payment for WooCommerce # CVE-2025-26933

CVE, Research URL

CVE-2025-26933

Date
Mar 10, 2025
Research Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7.
Affected versions
max 2.6.8.
Status
vulnerable
May 02, 2026

Place Order Without Payment for WooCommerce # CVE-2024-13362

CVE, Research URL

CVE-2024-13362

Date
May 01, 2026
Research Description
Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
max 8.0.8.
Status
vulnerable