Vulnerability Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart
- https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart
- https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart
- https://plugins.trac.wordpress.org/browser/wordpress-simple-paypal-shopping-cart
- https://plugins.trac.wordpress.org/changeset/3275373/
- https://www.tipsandtricks-hq.com/wordpress-simple-paypal-shopping-cart-plugin-76
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e0a3910b-adc4-4633-a6a
FAQ
What is CVE-2025-3530?
CVE-2025-3530 is a vulnerability with a CVSS score of 7.5 (HIGH). The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent ...
How severe is CVE-2025-3530?
CVE-2025-3530 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3530?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.