First published: Thu Mar 16 2023(Updated: )
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq Wordpress Simple Paypal Shopping Cart | <=4.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-1431.
The affected software is the WP Simple Shopping Cart plugin for WordPress up to and including version 4.6.3.
The severity of CVE-2023-1431 is medium with a severity value of 5.3.
CVE-2023-1431 affects the WP Simple Shopping Cart plugin by exposing sensitive information through saving shopping cart data exports in a publicly accessible location.
To fix CVE-2023-1431, update the WP Simple Shopping Cart plugin to a version beyond 4.6.3 or apply any available patches or fixes provided by the plugin developer.