Reflected Cross-Site Scripting Vulnerability in GLS Shipping for WooCommerce by WordPress
CVE-2026-6417

6.1MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
14 May 2026

What is CVE-2026-6417?

The GLS Shipping for WooCommerce plugin for WordPress has a vulnerability that allows untrusted input to be reflected back to the user without proper sanitization. This occurs through the 'failed_orders' parameter, enabling attackers to inject arbitrary JavaScript. When users unknowingly click on links crafted by the attacker, their browsers may execute harmful scripts that could compromise user sessions or redirect them to malicious sites. All versions of this plugin up to 1.4.0 are affected, highlighting the need for improved validation and sanitization processes to protect against such exploits.

Affected Version(s)

GLS Shipping for WooCommerce 0 <= 1.4.0

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tharadol Suksamran
.