Vulnerabilities and security researches forwc-place-order-without-payment wc-place-order-without-payment
Direction: ascendingJun 07, 2024
Place Order Without Payment for WooCommerce # 47f59ee33113bd4bcc6d8e18f80584a2c1a439d9
- CVE, Research URL
- Application
- Date
- Feb 28, 2022
- Research Description
- Place Order Without Payment for WooCommerce [wc-place-order-without-payment] < 2.5.2 WordPress WC Place Order Without Payment plugin <= 2.1 - Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability Toggle The Debug Mode via Cross-Site Request Forgery (CSRF) vulnerability discovered in WordPress WC Place Order Without Payment plugin (versions <= 2.1).
- Affected versions
-
max 2.5.2.
- Status
-
vulnerable
Nov 14, 2024
Place Order Without Payment for WooCommerce # CVE-2022-4974
- CVE, Research URL
- Application
- Date
- Oct 16, 2024
- Research Description
- The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
- Affected versions
-
max 2.2.
- Status
-
vulnerable
Feb 27, 2025
Place Order Without Payment for WooCommerce # CVE-2025-26933
- CVE, Research URL
- Application
- Date
- Mar 10, 2025
- Research Description
- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Nitin Prakash WC Place Order Without Payment allows PHP Local File Inclusion. This issue affects WC Place Order Without Payment: from n/a through 2.6.7.
- Affected versions
-
max 2.6.8.
- Status
-
vulnerable
May 02, 2026
Place Order Without Payment for WooCommerce # CVE-2024-13362
- CVE, Research URL
- Application
- Date
- May 01, 2026
- Research Description
- Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
max 8.0.8.
- Status
-
vulnerable