Browse all 3 CVE security advisories affecting Checkout Plugins. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Checkout Plugins enable e-commerce platforms to process payments and manage checkout workflows. Historically, these plugins have been vulnerable to remote code execution, cross-site scripting, and privilege escalation due to insufficient input validation and improper access controls. Notable security characteristics include handling sensitive payment data, making them attractive targets for attackers. Three CVEs on record highlight persistent security risks, including flaws allowing unauthorized access and data exposure. These vulnerabilities often stem from outdated code and lack of regular security updates, posing significant risks to e-commerce operations and customer data integrity.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-43316 | WordPress Stripe Payments For WooCommerce plugin <= 1.9.1 - Cross Site Request Forgery (CSRF) vulnerability — Stripe Payments For WooCommerce by CheckoutCWE-352 | 4.3 | Medium | 2024-08-26 |
| CVE-2024-43315 | WordPress Stripe Payments For WooCommerce plugin <= 1.9.1 - Insecure Direct Object References (IDOR) vulnerability — Stripe Payments For WooCommerce by CheckoutCWE-639 | 7.5 | High | 2024-08-18 |
| CVE-2023-23865 | WordPress Stripe Payments For WooCommerce by Checkout Plugin <= 1.4.10 is vulnerable to Cross Site Request Forgery (CSRF) — Stripe Payments For WooCommerce by Checkout PluginsCWE-352 | 4.3 | Medium | 2023-02-28 |
This page lists every published CVE security advisory associated with Checkout Plugins. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.