Vulnerability Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible for unauthenticated attackers to view potentially sensitive information and download a digital product without paying for it.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart
- https://plugins.trac.wordpress.org/changeset/3275373/
- https://wordpress.org/plugins/wordpress-simple-paypal-shopping-cart/#developers
- https://www.tipsandtricks-hq.com/ecommerce/wp-simple-cart-sell-digital-downloads
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fecc015-518f-4aab-a17
FAQ
What is CVE-2025-3529?
CVE-2025-3529 is a vulnerability with a CVSS score of 8.2 (HIGH). The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.1.2 via the 'file_url' parameter. This makes it possible...
How severe is CVE-2025-3529?
CVE-2025-3529 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3529?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.