GLS Shipping for WooCommerce Vulnerability (Medium) – CVE-2025-68011

GLS Shipping for WooCommerce Vulnerability (Medium) – CVE-2025-68011

by | Feb 24, 2026 | Plugins

Attack Vectors

GLS Shipping for WooCommerce (slug: gls-shipping-for-woocommerce) is affected by a Medium-severity reflected cross-site scripting (XSS) issue (CVE-2025-68011) in versions <= 1.4.0 (CVSS 6.1). Because it is reflected XSS, an attacker typically delivers a specially crafted link or request and relies on a user interaction (for example, a staff member clicking a link) to trigger script execution in the browser.

This attack can be launched by an unauthenticated attacker over the network, making it relevant not only to administrators, but also to anyone who may click through from emails, chat messages, tickets, or “urgent” operational requests involving shipping or order workflows.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping in the plugin, allowing attacker-supplied input to be reflected back to the page in a way that the browser interprets as executable script.

This issue is documented as CVE-2025-68011, with additional details available from the cited source: Wordfence Threat Intelligence.

Remediation: Update GLS Shipping for WooCommerce to version 1.4.1 or newer (patched) as soon as practical, and confirm the update is applied across all environments (production, staging, and any regional storefronts).

Technical or Business Impacts

While this is rated Medium, reflected XSS can still create meaningful business risk. If a user with access to operational or administrative functions is tricked into clicking a malicious link, the attacker may be able to run script in that user’s browser context. This can lead to outcomes such as session or account compromise, unauthorized actions performed as the victim, manipulation of page content, and increased likelihood of follow-on incidents (for example, credential theft via convincing prompts).

For marketing, executive leadership, and compliance teams, key concerns include brand trust (customers or staff seeing unexpected on-page behavior), operational disruption (order/shipping workflow interference), and potential privacy and regulatory exposure if an attacker leverages compromised sessions to access customer or order data.

Similar attacks (real examples): XSS has been used historically to spread rapidly and compromise accounts at scale, including the MySpace “Samy” worm and the 2010 Twitter XSS worm. These incidents highlight how “just a link click” can turn into widespread account and reputation impact.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers