[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f2DW_-JYh-VEawfWlR1s0VOtnfcAzi8j0rjeK3leQdks":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-47588","dynamic-pricing-with-discount-rules-for-woocommerce-authenticated-shop-manager-arbitrary-code-execution","Dynamic Pricing With Discount Rules for WooCommerce \u003C= 4.5.9 - Authenticated (Shop Manager+) Arbitrary Code Execution","The Dynamic Pricing With Discount Rules for WooCommerce plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.5.9. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to execute code on the server.","aco-woo-dynamic-pricing",null,"\u003C=4.5.9","4.5.10","high",7.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Control of Generation of Code ('Code Injection')","2025-08-14 00:00:00","2025-08-18 18:11:10",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F3c6b80a2-783d-4689-9cba-65f89058958f?source=api-prod",5]