CVE-2026-39564
Received Received - Intake
Sensitive Data Exposure in Sunshine Photo Cart

Publication date: 2026-04-08

Last updated on: 2026-04-14

Assigner: Patchstack

Description
Insertion of Sensitive Information Into Sent Data vulnerability in sunshinephotocart Sunshine Photo Cart sunshine-photo-cart allows Retrieve Embedded Sensitive Data.This issue affects Sunshine Photo Cart: from n/a through < 3.6.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
sunshinephotocart sunshine_photo_cart to 3.6.2 (exc)
sunshinephotocart sunshine_photo_cart From 3.6.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-201 The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to access sensitive information that is normally restricted from regular users, which constitutes a Sensitive Data Exposure issue.

Exposure of sensitive data can lead to non-compliance with common standards and regulations such as GDPR and HIPAA, which require protection of personal and sensitive information.

Although the CVSS score indicates a low priority threat with limited impact, any unauthorized access to sensitive data can result in regulatory violations, potential legal consequences, and damage to user privacy.

Therefore, organizations using the affected Sunshine Photo Cart plugin versions prior to 3.6.2 should promptly update to mitigate risks and maintain compliance with data protection regulations.


Can you explain this vulnerability to me?

CVE-2026-39564 is a Sensitive Data Exposure vulnerability found in the WordPress Sunshine Photo Cart plugin versions prior to 3.6.2.

This vulnerability allows unauthenticated attackers to access sensitive information that is normally restricted from regular users.

Such exposure can be leveraged to exploit other system weaknesses.

The issue is classified under the OWASP Top 10 category A3: Sensitive Data Exposure.


How can this vulnerability impact me? :

This vulnerability allows attackers to retrieve embedded sensitive data without authentication.

Exposure of sensitive information can lead to further exploitation of system weaknesses.

Although the CVSS severity score is 5.3, indicating a low priority threat with limited impact, such vulnerabilities are often targeted in mass-exploit campaigns affecting many websites.

Immediate mitigation involves updating the plugin to version 3.6.2 or later to prevent exploitation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the WordPress Sunshine Photo Cart plugin versions prior to 3.6.2 and allows unauthenticated attackers to access sensitive information. Detection involves identifying if the vulnerable plugin version is installed on your system.

You can check the installed plugin version on your WordPress site by running commands such as:

  • Using WP-CLI: wp plugin list | grep sunshine-photo-cart
  • Manually checking the plugin version in the WordPress admin dashboard under Plugins.

Network detection of exploitation attempts may be difficult as the vulnerability requires no authentication and involves sensitive data exposure through the plugin. Monitoring web server logs for unusual requests targeting the sunshine-photo-cart plugin endpoints could help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate and recommended mitigation step is to update the Sunshine Photo Cart plugin to version 3.6.2 or later, where the vulnerability has been patched.

If you are a Patchstack user, enabling auto-updates specifically for vulnerable plugins can ensure rapid protection against this and similar vulnerabilities.

Since the vulnerability requires no authentication to exploit, timely updating is critical to prevent unauthorized access to sensitive information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart