CVE-2025-3529: WordPress Simple PayPal Shopping Cart <= 5.1.2 - Unauthenticated Information Exposure via file_url Parameter

8.2 CVSS

Description

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.

Classification

CVE ID: CVE-2025-3529

CVSS Base Severity: HIGH

CVSS Base Score: 8.2

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Problem Types

CWE-201 Insertion of Sensitive Information Into Sent Data

Affected Products

Vendor: mra13

Product: WordPress Simple Shopping Cart

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.07% (probability of being exploited)

EPSS Percentile: 22.0% (scored less or equal to compared to others)

EPSS Date: 2025-05-22 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3529
https://www.wordfence.com/threat-intel/vulnerabilities/id/8fecc015-518f-4aab-a17e-17cf4b8cf123?source=cve
https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/includes/wpsc-shortcodes-related.php#L92
https://www.tipsandtricks-hq.com/ecommerce/wp-simple-cart-sell-digital-downloads-2468
https://wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/#developers
https://plugins.trac.wordpress.org/changeset/3275373/

Timeline