CVE-2025-58872

6.5 MEDIUM

📋 TL;DR

This vulnerability in the Simple Price Calculator WordPress plugin allows attackers to retrieve embedded sensitive data through information disclosure. It affects all WordPress sites using Simple Price Calculator versions up to and including 1.3. The vulnerability enables unauthorized access to potentially sensitive information stored within the plugin.

💻 Affected Systems

Products:
  • Simple Price Calculator WordPress Plugin
Versions: n/a through 1.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive configuration data, API keys, or other embedded secrets, potentially leading to complete site compromise or data breach.

🟠

Likely Case

Unauthorized users retrieve exposed sensitive information such as configuration details or internal data structures, enabling further attacks.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: MEDIUM - Internal systems could still be affected if the plugin is used internally, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the plugin's data structures and endpoints, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.3

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/simple-price-calculator-basic/vulnerability/wordpress-simple-price-calculator-plugin-1-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Simple Price Calculator. 4. Click 'Update Now' if update available. 5. If no update, deactivate and remove plugin, then install latest version from WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily deactivate the vulnerable plugin until patched version is available

wp plugin deactivate simple-price-calculator

🧯 If You Can't Patch

  • Implement web application firewall rules to block access to vulnerable plugin endpoints
  • Restrict access to WordPress admin interface using IP whitelisting or authentication proxies

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Simple Price Calculator version. If version is 1.3 or earlier, you are vulnerable.

Check Version:

wp plugin get simple-price-calculator --field=version

Verify Fix Applied:

After update, verify plugin version is higher than 1.3 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /wp-content/plugins/simple-price-calculator/ endpoints
  • Multiple failed attempts to access plugin-specific URLs

Network Indicators:

  • HTTP requests to plugin endpoints from unexpected sources
  • Patterns of information gathering requests

SIEM Query:

source="wordpress.log" AND (uri="/wp-content/plugins/simple-price-calculator/*" OR plugin="simple-price-calculator")

🔗 References

📤 Share & Export