The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 23 Apr 2025 07:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item. | |
Title | WordPress Simple PayPal Shopping Cart <= 5.1.2 - Unauthenticated Product Price Manipulation | |
Weaknesses | CWE-472 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-23T07:06:49.749Z
Updated: 2025-04-23T16:31:12.480Z
Reserved: 2025-04-11T22:18:57.487Z
Link: CVE-2025-3530

Updated: 2025-04-23T16:31:01.691Z

Status : Awaiting Analysis
Published: 2025-04-23T08:15:14.723
Modified: 2025-04-23T14:08:13.383
Link: CVE-2025-3530

No data.