Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes.
Published: 2025-05-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated data access and modification
Action: Patch Immediately
AI Analysis

Impact

The WordPress Simple PayPal Shopping Cart plugin for WordPress suffers from an insecure direct object reference vulnerability. Because the plugin does not randomize a user‑controlled key, an attacker can construct a request that references any shopping cart or product. This allows unauthenticated users to read customer cart contents, modify product links, add or delete products, and discover coupon codes. The weakness aligns with CWE‑639 and directly compromises both confidentiality and integrity of e‑commerce data.

Affected Systems

The security issue affects the Simple PayPal Shopping Cart plugin written by mra13, specifically all versions up to and including 5.1.3 that are installed on WordPress sites. Any user running a vulnerable instance, regardless of the WordPress theme or host, is exposed to this flaw.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity vulnerability. With an EPSS score of less than 1%, current exploitation probability remains low, and the vulnerability is not listed in the CISA KEV catalog. However, the attack requires no authentication and can be carried out by sending a crafted request that includes the predictable key, meaning that a determined attacker could discover or guess keys to access or alter cart information. Because the flaw depends on a direct reference, a site lacking additional controls is especially at risk.

Generated by OpenCVE AI on April 21, 2026 at 21:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple PayPal Shopping Cart plugin to the latest released version that addresses the insecure direct object reference.
  • If an upgrade is not immediately possible, enforce an authentication check so that only logged‑in, authorized users can request or modify cart data; add explicit access‑control validation for the cart key.
  • Implement or enforce key randomization or a cryptographically secure, unguessable token when generating or validating cart identifiers, ensuring that attackers cannot predict or enumerate cart references.

Generated by OpenCVE AI on April 21, 2026 at 21:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15024 The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes.
History

Tue, 06 May 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Tipsandtricks-hq
Tipsandtricks-hq wordpress Simple Paypal Shopping Cart
CPEs cpe:2.3:a:tipsandtricks-hq:wordpress_simple_paypal_shopping_cart:*:*:*:*:*:wordpress:*:*
Vendors & Products Tipsandtricks-hq
Tipsandtricks-hq wordpress Simple Paypal Shopping Cart

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 01 May 2025 11:30:00 +0000

Type Values Removed Values Added
Description The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.3 due to lack of randomization of a user controlled key. This makes it possible for unauthenticated attackers to access customer shopping carts and edit product links, add or delete products, and discover coupon codes.
Title WordPress Simple PayPal Shopping Cart <= 5.1.3 - Insecure Direct Object Reference
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Tipsandtricks-hq Wordpress Simple Paypal Shopping Cart
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:11.176Z

Reserved: 2025-04-22T16:33:30.164Z

Link: CVE-2025-3874

cve-icon Vulnrichment

Updated: 2025-05-01T13:46:31.537Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-01T12:15:17.400

Modified: 2025-05-06T15:39:29.083

Link: CVE-2025-3874

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:15:45Z

Weaknesses