Lucene search

K
nvd[email protected]NVD:CVE-2023-1431
HistoryMar 16, 2023 - 1:15 p.m.

CVE-2023-1431

2023-03-1613:15:10
web.nvd.nist.gov
wordpress
simple shopping cart
sensitive information exposure
data exports
publicly accessible location
unauthenticated attackers
administrators
first name
last name
email
address
ip address

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

32.4%

The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.

Affected configurations

NVD
Node
tipsandtricks-hqwordpress_simple_paypal_shopping_cartRange4.6.3wordpress

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

32.4%

Related for NVD:CVE-2023-1431