CVE-2023-41874

7.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts into web pages via the Tyche Softwares Order Delivery Date for WooCommerce WordPress plugin. When exploited, it can lead to session hijacking, credential theft, or website defacement. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Tyche Softwares Order Delivery Date for WooCommerce WordPress plugin
Versions: <= 3.20.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. Vulnerability is in the plugin's frontend components accessible to unauthenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover, admin credential theft, malware distribution to visitors, or data exfiltration from user sessions.

🟠

Likely Case

Session hijacking of logged-in users, credential theft via phishing, or website defacement.

🟢

If Mitigated

Limited impact with proper Content Security Policy (CSP) headers and input validation, though XSS could still execute in user browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS vulnerabilities are commonly exploited with simple payloads. No public exploit code is documented, but weaponization is likely given the low complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.20.1 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/order-delivery-date-for-woocommerce/wordpress-order-delivery-date-for-woocommerce-plugin-3-20-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Order Delivery Date for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched.

wp plugin deactivate order-delivery-date-for-woocommerce

Web Application Firewall (WAF) Rules

all

Configure WAF to block XSS payloads targeting plugin endpoints.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate script execution.
  • Use web application firewall with XSS protection rules.

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins > Installed Plugins.

Check Version:

wp plugin get order-delivery-date-for-woocommerce --field=version

Verify Fix Applied:

Confirm plugin version is 3.20.1 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET/POST requests with script tags or JavaScript payloads to plugin endpoints
  • 404 errors for malicious script URLs

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript in query parameters to /wp-content/plugins/order-delivery-date-for-woocommerce/ paths

SIEM Query:

source="web_access_logs" AND uri.path="/wp-content/plugins/order-delivery-date-for-woocommerce/*" AND (http.query CONTAINS "<script>" OR http.query CONTAINS "javascript:")

🔗 References

📤 Share & Export