First published: Wed Apr 23 2025(Updated: )
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq Wordpress Simple Paypal Shopping Cart | <=5.1.2 | |
WordPress Simple PayPal Shopping Cart | <=5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-3529 is considered high due to the potential for unauthorized access to sensitive information.
To fix CVE-2025-3529, update the WordPress Simple Shopping Cart plugin to version 5.1.3 or later.
All users of the WordPress Simple Shopping Cart plugin up to and including version 5.1.2 are affected by CVE-2025-3529.
CVE-2025-3529 is caused by inadequate validation of the 'file_url' parameter, leading to sensitive information exposure.
CVE-2025-3529 is categorized as a Sensitive Information Exposure vulnerability.