Browse all 5 CVE security advisories affecting Octolize. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Octolize provides e-commerce shipping and tracking solutions for online retailers. Historically, their products have been vulnerable to multiple security issues, including cross-site scripting (XSS), remote code execution (RCE), and privilege escalation vulnerabilities. These flaws have allowed attackers to execute arbitrary code, manipulate user sessions, and gain unauthorized access to systems. The company has addressed several critical vulnerabilities in their WordPress plugins and other integrations, with five CVEs currently documented. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities in their software highlights the importance of timely updates and security hardening for their customers.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-32811 | WordPress USPS Shipping for WooCommerce – Live Rates plugin <= 1.9.4 - Sensitive Data Exposure via Log File vulnerability — USPS Shipping for WooCommerce – Live RatesCWE-532 | 5.3 | Medium | 2024-06-09 |
| CVE-2024-31943 | WordPress USPS Shipping for WooCommerce plugin <= 1.9.2 - Cross Site Request Forgery (CSRF) vulnerability — USPS Shipping for WooCommerce – Live RatesCWE-352 | 4.3 | Medium | 2024-04-10 |
This page lists every published CVE security advisory associated with Octolize. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.