CVE-2025-3530
WordPress Simple PayPal Shopping Cart <= 5.1.2 - Unauthenticated Product Price Manipulation
highExternal Control of Assumed-Immutable Web Parameter
7.5
CVSS Score
7.5
CVSS Score
high
Severity
5.1.3
Patched in
1d
Time to patch
Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
None
Confidentiality
High
Integrity
None
Availability
Technical Details
Affected versions
<=5.1.2PublishedApril 22, 2025
Last updatedApril 23, 2025
Affected pluginwordpress-simple-paypal-shopping-cart
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.