The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.
References
Configurations
No configuration.
History
23 Apr 2025, 14:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 Apr 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-23 08:15
Updated : 2025-04-23 14:08
NVD link : CVE-2025-3530
Mitre link : CVE-2025-3530
CVE.ORG link : CVE-2025-3530
JSON object : View
Products Affected
No product.
CWE
CWE-472
External Control of Assumed-Immutable Web Parameter