CVE-2026-3231
HIGHCVSS v3
7.2
HIGH
EPSS Score
—
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom radio and checkboxgroup field values submitted through the WooCommerce Block Checkout Store API in all versions up to, and including, 2.1.7. This is due to the `prepare_single_field_data()` method in `class-thwcfd-block-order-data.php` first escaping values with `esc_html()` then immediately reversing the escaping with `html_entity_decode()` for radio and chec
Technical Details
- CVSS v3 Vector
- 3.1
Frequently Asked Questions
What is CVE-2026-3231?
The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom radio and checkboxgroup field values submitted through the WooCommerce Block Checkout Store API in all versions up to, and including, 2.1.7. This is due to the `prepare_single_field_data()` method in `class-thwcfd-block-order-data.php` first escaping values with `esc_html()` then immediately reversing the escaping with `html_entity_decode()` for radio and chec
Is CVE-2026-3231 actively exploited?
Active exploitation of CVE-2026-3231 has not been confirmed. The EPSS score is N/A%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2026-3231?
CVE-2026-3231 has a CVSS v3 base score of 7.2 (HIGH severity), with vector string 3.1.
Is CVE-2026-3231 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.