vulnerability

WordPress Plugin: wordpress-simple-paypal-shopping-cart: CVE-2025-3889: Authorization Bypass Through User-Controlled Key

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Apr 30, 2025
Added
May 15, 2025
Modified
May 15, 2025

Description

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 via the 'process_payment_data' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to change the quantity of a product to a negative number, which subtracts the product cost from the total order cost. The attack will only work with Manual Checkout mode, as PayPal and Stripe will not process payments for a negative quantity.

Solution

wordpress-simple-paypal-shopping-cart-plugin-cve-2025-3889
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.