We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3529

WordPress Simple PayPal Shopping Cart <= 5.1.2 - Unauthenticated Information Exposure via file_url Parameter



Description

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.

Reserved 2025-04-11 | Published 2025-04-23 | Updated 2025-04-23 | Assigner Wordfence


HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

Problem types

CWE-201 Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

*
affected

Timeline

2025-04-22:Disclosed

Credits

Jack Taylor finder

References

www.wordfence.com/...-518f-4aab-a17e-17cf4b8cf123?source=cve

plugins.trac.wordpress.org/...es/wpsc-shortcodes-related.php

www.tipsandtricks-hq.com/...cart-sell-digital-downloads-2468

wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/

plugins.trac.wordpress.org/changeset/3275373/

cve.org (CVE-2025-3529)

nvd.nist.gov (CVE-2025-3529)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3529

Support options

Helpdesk Chat, Email, Knowledgebase