Cyber Posture

CVE-2025-13773

CriticalRCE

Published: 24 December 2025

Published
24 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0052 67.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13773 is a critical-severity Code Injection (CWE-94) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to block unauthenticated access to the vulnerable WooCommerce_Delivery_Notes::update function.

prevent

Validates and sanitizes inputs to prevent code injection through the unescaped data in template.php.

prevent

Mandates secure configuration settings to disable PHP execution in Dompdf, eliminating the code execution vector.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated remote code execution in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function,…

more

PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.

Deeper analysisAI

CVE-2025-13773 is a remote code execution vulnerability in the Print Invoice & Delivery Notes for WooCommerce plugin for WordPress, affecting all versions up to and including 5.8.0. The issue originates in the 'WooCommerce_Delivery_Notes::update' function due to a missing capability check, PHP execution enabled within Dompdf, and missing escaping in the 'template.php' file, classified under CWE-94 (Code Injection).

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity, no privileges, and no user interaction required, as indicated by its CVSS score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation enables arbitrary code execution on the server, granting high impacts to confidentiality, integrity, and availability.

References provided link to vulnerable code locations in the plugin's source repository, including lines 347 and 473 in class-woocommerce-delivery-notes.php (missing capability check), line 52 in dompdf/src/PhpEvaluator.php (PHP enabled), line 37 in wcdn-front-function.php, and line 36 in templates/pdf/simple/invoice/template.php (missing escape).

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-35178Shared CWE-94
CVE-2024-1490Shared CWE-94
CVE-2024-7419Shared CWE-94
CVE-2025-46581Shared CWE-94
CVE-2025-65037Shared CWE-94
CVE-2025-10679Shared CWE-94
CVE-2024-57401Shared CWE-94
CVE-2026-23498Shared CWE-94
CVE-2026-1929Shared CWE-94
CVE-2026-39337Shared CWE-94

References