Coupon Affiliates – Affiliate Plugin for WooCommerce

Information

Software Type Plugin
Software Slug woo-coupon-usage (view on wordpress.org)
Software Status Active
Software Author elliotvs
Software Website couponaffiliates.com
Software Downloads 248,841
Software Active Installs 5,000
Software Record Last Updated December 4, 2024

8 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Coupon Affiliates <= 5.12.7 - Reflected Cross-Site Scripting Patched CVE-2024-29125 6.1 stealthcopter March 16, 2024
Freemius SDK <= 2.5.9 - Reflected Cross-Site Scripting via fs_request_get Patched CVE-2023-33999 6.1 Rafie Muhammad July 18, 2023
Coupon Affiliates <= 5.4.5 - Reflected Cross-Site Scripting via 'page' Patched CVE-2023-30475 6.1 Ivy (TOOR, Lisa) April 13, 2023
Coupon Affiliates <= 5.4.3 - Unauthenticated Stored Cross-Site Scripting Patched CVE-2023-28992 7.2 thiennv March 31, 2023
Freemius SDK <= 2.4.2 - Missing Authorization Checks Patched CVE-2022-4974 6.3 March 4, 2022
WooCommerce Affiliate Plugin - Coupon Affiliates < 4.16.4.5 - Stored Cross-Site Scripting Patched CVE-2022-0818 7.2 cydave March 2, 2022
WooCommerce Affiliate Plugin – Coupon Affiliates < 4.11.3.4 - Cross-Site Request Forgery Patched 8.8 WPScanTeam October 11, 2021
WooCommerce Affiliate Plugin – Coupon Affiliates <= 4.11.0.1 - Reflected Cross-Site Scripting Patched 6.1 WPScanTeam August 24, 2021

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation