CVE-2025-3529
WordPress Simple PayPal Shopping Cart <= 5.1.2 - Unauthenticated Information Exposure via file_url Parameter
CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.
| CWE | CWE-201 |
| Vendor | mra13 |
| Product | simple shopping cart |
| Published | Apr 23, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for mra13 simple shopping cart
Be the first to know when new high vulnerabilities affecting mra13 simple shopping cart are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
mra13 / Simple Shopping Cart
0 โค 5.1.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/8fecc015-518f-4aab-a17e-17cf4b8cf123?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart/tags/5.1.2/includes/wpsc-shortcodes-related.php#L92 tipsandtricks-hq.com: https://www.tipsandtricks-hq.com/ecommerce/wp-simple-cart-sell-digital-downloads-2468 wordpress.org: https://wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/#developers plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3275373/
Credits
Jack Taylor