First published: Thu May 01 2025(Updated: )
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 via the 'process_payment_data' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to change the quantity of a product to a negative number, which subtracts the product cost from the total order cost. The attack will only work with Manual Checkout mode, as PayPal and Stripe will not process payments for a negative quantity.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq Wordpress Simple Paypal Shopping Cart | <=5.1.3 | |
WordPress Simple PayPal Shopping Cart | <=5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3889 has a high severity due to the vulnerability allowing unauthenticated attackers to exploit the lack of validation.
To fix CVE-2025-3889, update the WordPress Simple Shopping Cart plugin to version 5.1.4 or later.
CVE-2025-3889 affects all versions of WordPress Simple Shopping Cart up to and including 5.1.3.
CVE-2025-3889 is classified as an Insecure Direct Object Reference vulnerability.
Yes, CVE-2025-3889 can be exploited remotely by unauthenticated attackers due to insufficient access controls.