MEDIUM (6.3)
    Plugin

    Stored Cross-Site Scripting in Simple Shopping Cart Plugin via Shortcode

    Published Date: 4/4/2026
    CVE ID: CVE-2026-0552

    Summary

    The Simple Shopping Cart plugin for WordPress suffers from a Stored Cross-Site Scripting (XSS) vulnerability due to inadequate input sanitization and output escaping in its `wpsc_display_product` shortcode. This allows contributor-level and higher authenticated users to inject harmful scripts into pages.

    Vulnerability Details

    This vulnerability arises from the failure to properly sanitize and escape user inputs passed through the `wpsc_display_product` shortcode of the Simple Shopping Cart plugin. Attackers with at least contributor-level access can exploit this by injecting malicious scripts into shortcode attributes. Once injected, these scripts will execute whenever a user views the affected page, potentially leading to unauthorized actions on behalf of other users, session hijacking, or data theft. Stored XSS is particularly hazardous as the injected scripts remain within the site's content and can thus impact all users interacting with the contaminated page. The impact of this vulnerability is contingent on the user's role and permissions, making it critical for sites with multiple contributors to patch this security flaw.

    Recommendations

    To mitigate this vulnerability, site administrators should ensure that they are using the latest secure version of the Simple Shopping Cart plugin and monitor for updates continually. Implementing a web application firewall (WAF) can help detect and block XSS attempts. Additionally, review user roles and permissions to limit exposure by granting the least privileges necessary.

    Available Fixes

    Last Updated: 4/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More