Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3231: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehigh Checkout Field Editor (Checkout Manager) for WooCommerce

0
High
VulnerabilityCVE-2026-3231cvecve-2026-3231cwe-79
Published: Wed Mar 11 2026 (03/11/2026, 09:25:44 UTC)
Source: CVE Database V5
Vendor/Project: themehigh
Product: Checkout Field Editor (Checkout Manager) for WooCommerce

Description

CVE-2026-3231 is a high-severity stored cross-site scripting (XSS) vulnerability in the Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin. It affects all versions up to 2. 1. 7 and allows unauthenticated attackers to inject malicious scripts via custom radio and checkbox group fields submitted through the WooCommerce Block Checkout Store API. The vulnerability arises from improper input neutralization where escaping is reversed and a permissive HTML allowlist permits dangerous event handler attributes. Exploited scripts execute when administrators view order details, risking credential theft or session hijacking. No known exploits are reported yet, but the vulnerability's ease of exploitation and impact on administrative interfaces make it critical to patch or mitigate promptly. Organizations using this plugin should restrict access, monitor logs, and apply updates once available. Countries with significant WooCommerce usage and WordPress e-commerce deployments are most at risk.

AI-Powered Analysis

AILast updated: 03/11/2026, 09:59:06 UTC

Technical Analysis

CVE-2026-3231 is a stored cross-site scripting vulnerability classified under CWE-79, affecting the Checkout Field Editor (Checkout Manager) plugin for WooCommerce on WordPress. The flaw exists in all versions up to 2.1.7 due to insecure handling of custom radio and checkbox group field values submitted via the WooCommerce Block Checkout Store API. Specifically, the method `prepare_single_field_data()` in `class-thwcfd-block-order-data.php` first escapes input values using `esc_html()`, but then immediately reverses this escaping with `html_entity_decode()` for these field types. This flawed logic, combined with a permissive `wp_kses()` allowlist in `get_allowed_html()` that explicitly permits the `<select>` element with the `onchange` event handler attribute, enables attackers to inject arbitrary JavaScript code. Since the injection is stored, the malicious script executes whenever an administrator views the affected order details page in the WordPress backend. The vulnerability requires no authentication or user interaction to exploit, making it accessible to unauthenticated remote attackers. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality and integrity with scope change. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WooCommerce sites using this plugin, especially those with administrative users who view order details.

Potential Impact

The primary impact of CVE-2026-3231 is the execution of arbitrary JavaScript in the context of the WordPress administrative interface. This can lead to theft of administrator credentials, session hijacking, and unauthorized actions performed with administrative privileges. Since the malicious payload is stored and triggered when viewing order details, attackers can maintain persistent access or conduct targeted attacks against site administrators. This compromises the confidentiality and integrity of the e-commerce platform and potentially the entire WordPress installation. The vulnerability does not directly affect availability but can facilitate further attacks that degrade service or lead to data breaches. Organizations worldwide using WooCommerce with this plugin are at risk, particularly those with high transaction volumes and sensitive customer data. The ease of exploitation without authentication increases the threat level, making it attractive for attackers to target e-commerce sites for financial gain or disruption.

Mitigation Recommendations

1. Immediately restrict access to the WordPress administrative interface to trusted personnel only, using IP whitelisting or VPNs where possible. 2. Monitor web server and application logs for suspicious requests to the WooCommerce Block Checkout Store API and unusual activity in order detail views. 3. Disable or remove the Checkout Field Editor (Checkout Manager) plugin until a patched version is released. 4. If disabling the plugin is not feasible, implement a Web Application Firewall (WAF) with custom rules to block requests containing suspicious payloads targeting radio and checkbox group fields. 5. Educate administrators to avoid clicking on suspicious orders or unknown input values until the issue is resolved. 6. Once a vendor patch is available, apply it promptly and verify that the vulnerability is mitigated by testing with crafted payloads. 7. Review and harden the allowed HTML tags and attributes in the plugin’s sanitization functions to prevent event handler attributes like 'onchange' from being permitted. 8. Consider additional security controls such as multi-factor authentication for administrators to reduce risk from stolen credentials.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-25T21:30:41.083Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b139a22f860ef9438a0d7c

Added to database: 3/11/2026, 9:45:06 AM

Last enriched: 3/11/2026, 9:59:06 AM

Last updated: 3/11/2026, 10:59:39 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses