Description
The Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpsc_display_product' shortcode in all versions up to, and including, 5.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-04
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (Contributor+ authentication required)
Action: Immediate Patch
AI Analysis

Impact

The Simple Shopping Cart plugin for WordPress allows attackers with contributor-level access to supply arbitrary script code through the 'wpsc_display_product' shortcode. The plugin fails to properly sanitize or escape user‑supplied attributes, enabling the placement of malicious scripts that persist across pages. When an affected page is viewed, the injected code executes within the browser context of any visitor, potentially leading to session hijacking, defacement, or the execution of additional malicious payloads. The weakness is a classic stored cross‑site scripting flaw (CWE‑79) that directly compromises the confidentiality of user data and the integrity of the site’s content.

Affected Systems

This vulnerability impacts installations of the Simple Shopping Cart plugin for WordPress with versions up to and including 5.2.4. Sites that have deployed any of these versions and grant contributor or higher permissions to any user profile are potentially exposed. The plugin is developed by mra13 and is integrated into WordPress core as a third‑party extension.

Risk and Exploitability

The CVSS score of 6.4 indicates a medium severity rating, which aligns with the scope of the flaw—only users with contributor-level or higher privileges can inject the payload, and the impact is limited to browsers that visit the affected pages. No EPSS score is available, but the absence of a listing in the CISA KEV catalog suggests the vulnerability has not yet been widely exploited at the time of reporting. The likely attack vector is web‑based, relying on authenticated access to the plugin’s shortcode editor; once the script is injected, it becomes automatically executed for all users who view the rendered page.

Generated by OpenCVE AI on April 4, 2026 at 11:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Shopping Cart plugin to the latest available version (5.2.5 or newer).
  • If an immediate update is not possible, disable or remove the 'wpsc_display_product' shortcode from the site or restrict its usage to trusted users only.
  • Verify that all users with contributor or higher permissions follow best‑practice guidelines for input handling; consider reviewing user role permissions to limit injection opportunities.
  • Maintain the WordPress core and all other plugins at their latest secure releases to reduce the attack surface for future vulnerabilities.

Generated by OpenCVE AI on April 4, 2026 at 11:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Mra13
Mra13 simple Shopping Cart
Wordpress
Wordpress wordpress
Vendors & Products Mra13
Mra13 simple Shopping Cart
Wordpress
Wordpress wordpress

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 04 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Simple Shopping Cart plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpsc_display_product' shortcode in all versions up to, and including, 5.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Simple Shopping Cart <= 5.2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'wpsc_display_product' Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Mra13 Simple Shopping Cart
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:13:59.705Z

Reserved: 2026-01-01T18:03:52.749Z

Link: CVE-2026-0552

cve-icon Vulnrichment

Updated: 2026-04-06T15:46:34.387Z

cve-icon NVD

Status : Deferred

Published: 2026-04-04T08:16:05.727

Modified: 2026-04-24T18:13:28.877

Link: CVE-2026-0552

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:20:57Z

Weaknesses