The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2878855%40wordpress-simple-paypal-shopping-cart&new=2878855%40wordpress-simple-paypal-shopping-cart&sfp_email=&sfph_mail= - Release Notes | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=cve - Third Party Advisory |
07 Nov 2023, 04:03
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-03-16 13:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1431
Mitre link : CVE-2023-1431
CVE.ORG link : CVE-2023-1431
JSON object : View
Products Affected
tipsandtricks-hq
- wordpress_simple_paypal_shopping_cart
CWE
No CWE.