cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwordpress-simple-paypal-shopping-cart wordpress-simple-paypal-shopping-cart

Direction: descending
May 05, 2025

WordPress Simple Shopping Cart # CVE-2025-3890

CVE, Research URL

CVE-2025-3890

Date
May 01, 2025
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' shortcode in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 5.1.4.
Status
vulnerable

WordPress Simple Shopping Cart # CVE-2025-3874

CVE, Research URL

CVE-2025-3874

Date
May 01, 2025
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes.
Affected versions
max 5.1.4.
Status
vulnerable

WordPress Simple Shopping Cart # CVE-2025-3889

CVE, Research URL

CVE-2025-3889

Date
May 01, 2025
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 via the 'process_payment_data' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to change the quantity of a product to a negative number, which subtracts the product cost from the total order cost. The attack will only work with Manual Checkout mode, as PayPal and Stripe will not process payments for a negative quantity.
Affected versions
max 5.1.4.
Status
vulnerable
Apr 30, 2025

WordPress Simple Shopping Cart # CVE-2025-3529

CVE, Research URL

CVE-2025-3529

Date
Apr 23, 2025
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.
Affected versions
max 5.1.3.
Status
vulnerable
Apr 29, 2025

WordPress Simple Shopping Cart # CVE-2025-3530

CVE, Research URL

CVE-2025-3530

Date
Apr 23, 2025
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.
Affected versions
max 5.1.3.
Status
vulnerable
Dec 25, 2024

WordPress Simple Shopping Cart # CVE-2024-12622

CVE, Research URL

CVE-2024-12622

Date
Dec 24, 2024
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' and 'wp_cart_display_product' shortcodes in all versions up to, and including, 5.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 5.0.8.
Status
vulnerable
Jun 06, 2024

WordPress Simple Shopping Cart # CVE-2023-6497

CVE, Research URL

CVE-2023-6497

Date
Jan 27, 2024
Research Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the automatic redirect URL setting in all versions up to and including 4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected versions
max 4.7.2.
Status
vulnerable

WordPress Simple Shopping Cart # CVE-2013-2705

CVE, Research URL

CVE-2013-2705

Date
May 13, 2014
Research Description
Cross-site request forgery (CSRF) vulnerability in the WordPress Simple Paypal Shopping Cart plugin before 3.6 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings.
Affected versions
max 3.6.
Status
vulnerable

WordPress Simple Shopping Cart # CVE-2023-1431

CVE, Research URL

CVE-2023-1431

Date
Mar 16, 2023
Research Description
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
Affected versions
max 4.6.4.
Status
vulnerable

WordPress Simple Shopping Cart # CVE-2022-4672

CVE, Research URL

CVE-2022-4672

Date
Jan 23, 2023
Research Description
The WordPress Simple Shopping Cart WordPress plugin before 4.6.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Affected versions
max 4.6.2.
Status
vulnerable