CVE-2023-41874
📋 TL;DR
This vulnerability allows unauthenticated attackers to inject malicious scripts into web pages via the Tyche Softwares Order Delivery Date for WooCommerce WordPress plugin. When exploited, it can lead to session hijacking, credential theft, or website defacement. All WordPress sites using vulnerable plugin versions are affected.
💻 Affected Systems
- Tyche Softwares Order Delivery Date for WooCommerce WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover, admin credential theft, malware distribution to visitors, or data exfiltration from user sessions.
Likely Case
Session hijacking of logged-in users, credential theft via phishing, or website defacement.
If Mitigated
Limited impact with proper Content Security Policy (CSP) headers and input validation, though XSS could still execute in user browsers.
🎯 Exploit Status
Reflected XSS vulnerabilities are commonly exploited with simple payloads. No public exploit code is documented, but weaponization is likely given the low complexity.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.20.1 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Order Delivery Date for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched.
wp plugin deactivate order-delivery-date-for-woocommerce
Web Application Firewall (WAF) Rules
allConfigure WAF to block XSS payloads targeting plugin endpoints.
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to mitigate script execution.
- Use web application firewall with XSS protection rules.
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins > Installed Plugins.
Check Version:
wp plugin get order-delivery-date-for-woocommerce --field=version
Verify Fix Applied:
Confirm plugin version is 3.20.1 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual GET/POST requests with script tags or JavaScript payloads to plugin endpoints
- 404 errors for malicious script URLs
Network Indicators:
- HTTP requests containing <script> tags or JavaScript in query parameters to /wp-content/plugins/order-delivery-date-for-woocommerce/ paths
SIEM Query:
source="web_access_logs" AND uri.path="/wp-content/plugins/order-delivery-date-for-woocommerce/*" AND (http.query CONTAINS "<script>" OR http.query CONTAINS "javascript:")
🔗 References
- https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve