The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 via the 'process_payment_data' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to change the quantity of a product to a negative number, which subtracts the product cost from the total order cost. The attack will only work with Manual Checkout mode, as PayPal and Stripe will not process payments for a negative quantity.
References
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 15:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 12:15
Updated : 2025-05-06 15:39
NVD link : CVE-2025-3889
Mitre link : CVE-2025-3889
CVE.ORG link : CVE-2025-3889
JSON object : View
Products Affected
tipsandtricks-hq
- wordpress_simple_paypal_shopping_cart
CWE
CWE-639
Authorization Bypass Through User-Controlled Key