Description
The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' shortcode in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-01
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the wp_cart_button shortcode
Action: Patch Immediately
AI Analysis

Impact

The WordPress Simple PayPal Shopping Cart plugin is vulnerable to stored cross‑site scripting through the wp_cart_button shortcode. Input attributes provided by users are not properly sanitized or escaped, allowing an authenticated contributor or higher to embed malicious scripts into the page content. When an affected page is viewed, the injected JavaScript executes in the visitor’s browser, enabling attackers to steal session cookies, deface content, or execute further malicious payloads.

Affected Systems

Any WordPress site running the Simple PayPal Shopping Cart plugin version 5.1.3 or earlier is affected. The vulnerability applies to all installations of the plugin where the wp_cart_button shortcode is used, regardless of the theme or other plugins in place.

Risk and Exploitability

The CVSS score of 6.4 classifies the issue as moderate severity, while an EPSS score of less than 1 % indicates that the likelihood of exploitation in the wild is low. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been exploited on a significant scale. However, because the stored scripts run on every visitor to the injected page, the potential impact is broad. Exploitation requires only that the attacker have contributor‑level or higher access, a role that many site administrators grant, making the attack vector relatively easy for a privileged user.

Generated by OpenCVE AI on April 21, 2026 at 21:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple PayPal Shopping Cart plugin to a version newer than 5.1.3 once a patched release becomes available
  • If an upgrade is not immediately possible, restrict the wp_cart_button shortcode so that only administrators can insert it, or disable the shortcode entirely for contributor and lower roles
  • Implement site‑wide input sanitization and output escaping measures, such as a security plugin that automatically escapes shortcode attributes

Generated by OpenCVE AI on April 21, 2026 at 21:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15022 The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' shortcode in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 06 May 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Tipsandtricks-hq
Tipsandtricks-hq wordpress Simple Paypal Shopping Cart
CPEs cpe:2.3:a:tipsandtricks-hq:wordpress_simple_paypal_shopping_cart:*:*:*:*:*:wordpress:*:*
Vendors & Products Tipsandtricks-hq
Tipsandtricks-hq wordpress Simple Paypal Shopping Cart

Thu, 01 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 01 May 2025 11:30:00 +0000

Type Values Removed Values Added
Description The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_cart_button' shortcode in all versions up to, and including, 5.1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WordPress Simple PayPal Shopping Cart <= 5.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Tipsandtricks-hq Wordpress Simple Paypal Shopping Cart
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:41.654Z

Reserved: 2025-04-22T23:22:48.568Z

Link: CVE-2025-3890

cve-icon Vulnrichment

Updated: 2025-05-01T13:39:41.337Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-01T12:15:17.830

Modified: 2025-05-06T14:55:31.320

Link: CVE-2025-3890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:15:45Z

Weaknesses