Plugin Vulnerability Hub
Plugin 8 known issues Latest disclosed Dec 05, 2025

MultiParcels Shipping For WooCommerce Vulnerabilities

Review known vulnerability records for the WordPress plugin MultiParcels Shipping For WooCommerce (`multiparcels-shipping-for-woocommerce`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-62995, CVE-2024-32095 and CVE-2023-3954, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
8
High or Critical
2
Patch Coverage
100%
Last Updated
Dec 19, 2025
Priority CVE Quick Links

Fast paths into MultiParcels Shipping For WooCommerce CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
7
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for MultiParcels Shipping For WooCommerce so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
8 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 2 high severity findings.
Recent CVEs
CVE-2025-62995, CVE-2024-32095 and CVE-2023-3954
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for MultiParcels Shipping For WooCommerce

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2025-62995
CVE-2025-62995: MultiParcels Shipping For WooCommerce <= 1.30.12 - Missing Authorization

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in versions up to, and including, 1.30.12. This makes it possible for authenticated attackers, with subscriber-level access and abov...

Published
Dec 05, 2025
Patched Release
1.30.13
Affected Versions
Versions up to 1.30.12
Next Step
Update to 1.30.13 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-32095
CVE-2024-32095: MultiParcels Shipping For WooCommerce < 1.16.9 - Cross-Site Request Forgery

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to 1.16.9 (exclusive). This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers t...

Published
Apr 11, 2024
Patched Release
1.16.9
Affected Versions
Versions before 1.16.9
Next Step
Update to 1.16.9 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-3954
CVE-2023-3954: MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via an unknown parameter in versions up to, and including, 1.15.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated...

Published
Jul 31, 2023
Patched Release
1.15.4
Affected Versions
Versions up to 1.15.3
Next Step
Update to 1.15.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-3366
CVE-2023-3366: MultiParcels Shipping For WooCommerce <= 1.15.1 - Cross-Site Request Forgery

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.15.1. This is due to missing nonce validation on the multiparcels_delete_shipping AJAX action. This makes it possible for unauthenticated...

Published
Jul 31, 2023
Patched Release
1.15.2
Affected Versions
Versions before 1.15.2
Next Step
Update to 1.15.2 or newer if supported.
Plugin High Patched: Yes
MultiParcels Shipping For WooCommerce <= 1.15.5 - Unauthenticated Stored Cross-Site Scripting

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘set_sender_location’ parameter saved via the 'settings_init' function hooked via admin_init in versions up to, and including, 1.15.5 due to insufficient input sani...

Published
Jul 25, 2023
Patched Release
1.15.6
Affected Versions
Versions up to 1.15.5
Next Step
Update to 1.15.6 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-3671
CVE-2023-3671: MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting

The MultiParcels Shipping For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in versions up to, and including, 1.15.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated at...

Published
Jul 17, 2023
Patched Release
1.15.4
Affected Versions
Versions up to 1.15.3
Next Step
Update to 1.15.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-3365
CVE-2023-3365: MultiParcels Shipping For WooCommerce <= 1.14.13 - Missing Authorization via get_history

The MultiParcels Shipping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'get_history' function in versions up to, and including, 1.14.13. This makes it possible for authenticated attackers with subscriber-level pe...

Published
Jul 17, 2023
Patched Release
1.14.14
Affected Versions
Versions up to 1.14.13
Next Step
Update to 1.14.14 or newer if supported.
Plugin High Patched: Yes CVE-2023-2843
CVE-2023-2843: MultiParcels Shipping For WooCommerce <= 1.14.12 - Authenticated(Subscriber+) SQL Injection via id

The MultiParcels Shipping plugin for WordPress is vulnerable to SQL Injection via the ‘id’ parameter in versions up to, and including, 1.14.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it p...

Published
Jul 17, 2023
Patched Release
1.14.15
Affected Versions
Versions up to 1.14.12
Next Step
Update to 1.14.15 or newer if supported.