The WooCommerce Checkout & Funnel Builder by CartFlows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.15. This is due to missing or incorrect nonce validation on the export_json, import_json, and status_logs_file functions. This makes it possible for unauthenticated attackers to import/export settings and trigger logs showing via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WooCommerce Checkout & Funnel Builder by CartFlows – Create High Converting Stores For WooCommerce <= 1.5.15 - Cross-Site Request Forgery Bypass | |
| Weaknesses | CWE-352 |
Fri, 25 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-07-01T03:30:11.536Z
Updated: 2026-04-08T16:35:18.079Z
Reserved: 2023-06-30T14:57:36.734Z
Link: CVE-2020-36736
Updated: 2024-08-04T17:37:06.428Z
Status : Modified
Published: 2023-07-01T04:15:09.883
Modified: 2026-04-08T17:16:36.327
Link: CVE-2020-36736
No data.