CVE-2025-13773
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary code on WordPress servers running the Print Invoice & Delivery Notes for WooCommerce plugin. The flaw combines missing capability checks, PHP execution in Dompdf, and template escaping issues. All WordPress sites using this plugin up to version 5.8.0 are affected.
💻 Affected Systems
- Print Invoice & Delivery Notes for WooCommerce WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, malware installation, ransomware deployment, or website defacement.
Likely Case
Attackers gain shell access to the server, install backdoors, steal sensitive data, or use the server for further attacks.
If Mitigated
Limited impact if proper network segmentation, WAF rules, and least privilege principles are implemented.
🎯 Exploit Status
The vulnerability is straightforward to exploit once details are understood, requiring minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.8.1 or later
Vendor Advisory: https://wordpress.org/plugins/woocommerce-delivery-notes/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Print Invoice & Delivery Notes for WooCommerce'. 4. Click 'Update Now' if available. 5. If not, download version 5.8.1+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable PHP in Dompdf
allModify Dompdf configuration to disable PHP execution
Edit includes/front/vendor/dompdf/dompdf/src/Options.php and set 'isPhpEnabled' => false
Add capability check
allAdd authentication check to the vulnerable update function
Add 'if (!current_user_can('manage_options')) { wp_die(); }' before line 347 in class-woocommerce-delivery-notes.php
🧯 If You Can't Patch
- Immediately disable or remove the Print Invoice & Delivery Notes for WooCommerce plugin
- Implement strict WAF rules to block requests to the vulnerable endpoint and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Print Invoice & Delivery Notes for WooCommerce → Version. If version is 5.8.0 or lower, you are vulnerable.
Check Version:
wp plugin list --name='Print Invoice & Delivery Notes for WooCommerce' --field=version
Verify Fix Applied:
After updating, verify version shows 5.8.1 or higher in WordPress plugins page.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=wcdn_update_template
- Unusual PHP execution in Dompdf logs
- Suspicious file creation in WordPress directories
Network Indicators:
- HTTP requests with malicious payloads in template parameters
- Outbound connections from WordPress server to unknown IPs
SIEM Query:
source="wordpress.log" AND (uri="/wp-admin/admin-ajax.php" AND parameters CONTAINS "wcdn_update_template")
🔗 References
- https://plugins.trac.wordpress.org/browser/woocommerce-delivery-notes/tags/5.8.0/includes/class-woocommerce-delivery-notes.php#L347
- https://plugins.trac.wordpress.org/browser/woocommerce-delivery-notes/tags/5.8.0/includes/class-woocommerce-delivery-notes.php#L473
- https://plugins.trac.wordpress.org/browser/woocommerce-delivery-notes/tags/5.8.0/includes/front/vendor/dompdf/dompdf/src/PhpEvaluator.php#L52
- https://plugins.trac.wordpress.org/browser/woocommerce-delivery-notes/tags/5.8.0/includes/front/wcdn-front-function.php#L37
- https://plugins.trac.wordpress.org/browser/woocommerce-delivery-notes/tags/5.8.0/templates/pdf/simple/invoice/template.php#L36
- https://plugins.trac.wordpress.org/changeset/3426119/woocommerce-delivery-notes
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b34fe-2414-4d6f-bf43-9c5b65ebf769?source=cve