CVE-2025-13773
Published: 24 December 2025
Description
The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function,…
more
PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations to block unauthenticated access to the vulnerable WooCommerce_Delivery_Notes::update function.
Validates and sanitizes inputs to prevent code injection through the unescaped data in template.php.
Mandates secure configuration settings to disable PHP execution in Dompdf, eliminating the code execution vector.
Security SummaryAI
CVE-2025-13773 is a remote code execution vulnerability in the Print Invoice & Delivery Notes for WooCommerce plugin for WordPress, affecting all versions up to and including 5.8.0. The issue originates in the 'WooCommerce_Delivery_Notes::update' function due to a missing capability check, PHP execution enabled within Dompdf, and missing escaping in the 'template.php' file, classified under CWE-94 (Code Injection).
Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity, no privileges, and no user interaction required, as indicated by its CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables arbitrary code execution on the server, granting high impacts to confidentiality, integrity, and availability.
References provided link to vulnerable code locations in the plugin's source repository, including lines 347 and 473 in class-woocommerce-delivery-notes.php (missing capability check), line 52 in dompdf/src/PhpEvaluator.php (PHP enabled), line 37 in wcdn-front-function.php, and line 36 in templates/pdf/simple/invoice/template.php (missing escape).
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated remote code execution in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application.