REPORT / 01

Analysis Report · Folder Analysis cache/woocommerce-delivery-notes_5.8.0 → cache/woocommerce-delivery-notes_5.9.0 — CVE-2025-13773

Shared security patch analysis results

mode patchdiff ai claude_cli haiku
02 · Lifecycle actions cancel · resume · skip · regenerate
03 · Share this analysis copy link · embed report
03 · CVE Security Analysis & Writeups ai-generated · per cve

Comprehensive security analysis generated by AI for each confirmed CVE match. Click on a CVE to view the detailed writeup including vulnerability background, technical details, patch analysis, and PoC guide.

CVE-2025-13773 NVD
AI-Generated Analysis
05 · Findings filter · search · paginate
Use quotes for exact: "SQL injection" · Operators: hello AND bye, admin OR root, -error, NOT warning
Showing 0 to 0 of 0 results
includes/front/wcdn-front-function.php AI: 1 vulnerabilities 1 true positive CVE-2025-13773
--- cache/woocommerce-delivery-notes_5.8.0/includes/front/wcdn-front-function.php	2025-12-24 00:33:41.321472434 +0000+++ cache/woocommerce-delivery-notes_5.9.0/includes/front/wcdn-front-function.php	2025-12-24 00:35:35.496538362 +0000@@ -34,7 +34,7 @@ 	// Instantiate and use the dompdf class. 	$options = new \Dompdf\Options(); 	$options->set( 'isRemoteEnabled', true );-	$options->set( 'isPhpEnabled', true );+	$options->set( 'isPhpEnabled', false ); 	$dompdf = new Dompdf( $options );  	// Load content from html file.
AI Analysis
Vulnerability Existed: yes
TRUE POSITIVE
Code Injection - CWE-95 - includes/front/wcdn-front-function.php [37]

Old Code:
```php
$options->set( 'isPhpEnabled', true );
```

Fixed Code:
```php
$options->set( 'isPhpEnabled', false );
```

Explanation:
Enabling PHP code execution within Dompdf (`isPhpEnabled` set to `true`) creates a critical code injection vulnerability. When this option is enabled, any PHP code embedded in HTML passed to Dompdf will be executed on the server. This is particularly dangerous in a PDF generation context where user-controlled content (such as order details in WooCommerce delivery notes) might be included. An attacker could inject malicious PHP code that would execute with the privileges of the web server process, potentially leading to remote code execution (RCE). The fix correctly disables PHP execution by setting `isPhpEnabled` to `false`, which prevents arbitrary PHP code from being evaluated during PDF generation. This is the secure default configuration for Dompdf.
CVE Analysis Results:
CVE-2025-13773: Yes
View CVE Description
The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.8.0 via the 'WooCommerce_Delivery_Notes::update' function. This is due to missing capability check in the 'WooCommerce_Delivery_Notes::update' function, PHP enabled in Dompdf, and missing escape in the 'template.php' file. This makes it possible for unauthenticated attackers to execute code on the server.
Showing 1 to 1 of 1 results