Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w4q5-363g-q68q

Опубликовано: 23 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.

EPSS

Процентиль: 69%
0.00588
Низкий

7.5 High

CVSS3

Дефекты

CWE-472

Связанные уязвимости

CVSS3: 7.5
nvd
10 месяцев назад

The WordPress Simple Shopping Cart plugin for WordPress is vulnerable to product price manipulation in all versions up to, and including, 5.1.2. This is due to a logic flaw involving the inconsistent use of parameters during the cart addition process. The plugin uses the parameter 'product_tmp_two' for computing a security hash against price tampering while using 'wspsc_product' to display the product, allowing an unauthenticated attacker to substitute details from a cheaper product and bypass payment for a more expensive item.

EPSS

Процентиль: 69%
0.00588
Низкий

7.5 High

CVSS3

Дефекты

CWE-472