Description
The MoneySpace plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.13.9. This is due to the plugin storing full payment card details (PAN, card holder name, expiry month/year, and CVV) in WordPress post_meta using base64_encode(), and then embedding these values into the publicly accessible mspaylink page's inline JavaScript without any authentication or authorization check. This makes it possible for unauthenticated attackers who know or can guess an order_id to access the mspaylink endpoint and retrieve full credit card numbers and CVV codes directly from the HTML/JS response, constituting a severe PCI-DSS violation.
Published: 2026-01-07
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure of Full Credit Card Details
Action: Immediate Patch
AI Analysis

Impact

The MoneySpace plugin for WordPress stores complete payment card details—PAN, card holder name, expiry month/year, and CVV—in WordPress post_meta using base64_encode(), then embeds these values into the publicly accessible mspaylink page’s inline JavaScript without any authentication or authorization checks. This flaw, identified as CWE‑200 Sensitive Information Exposure, permits an unauthenticated attacker who knows or can guess an order_id to retrieve full credit card numbers and CVV codes directly from the HTML/JS response, constituting a severe PCI‑DSS violation. The impact is a significant compromise of confidentiality and potential fraudulent exploitation of cardholder data.

Affected Systems

All installations of the MoneySpace plugin for WordPress with versions 2.13.9 or earlier are vulnerable. The affected product is identified as MoneySpace, and the vulnerability applies to every build up to and including 2.13.9.

Risk and Exploitability

The CVSS score of 8.6 classifies this flaw as high severity, yet the EPSS score is less than 1 %, indicating a low exploitation probability at present. It is not listed in the CISA KEV catalog. An attacker can exploit the vulnerability by sending an unauthenticated request to the mspaylink endpoint with a valid or guessable order_id and parsing the inline JavaScript for the base64‑encoded card data. The attack requires no special privileges and can be automated once the target order_id space is enumerated.

Generated by OpenCVE AI on April 22, 2026 at 03:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MoneySpace plugin to the latest available version that removes the data exposure flaw.
  • If immediate upgrade is not possible, restrict access to the mspaylink endpoint by enforcing authentication or role checks so that only authorized users can request order pages.
  • Remove stored payment card details from the WordPress post_meta database to eliminate any residual sensitive data.

Generated by OpenCVE AI on April 22, 2026 at 03:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 06:45:00 +0000

Type Values Removed Values Added
Description The MoneySpace plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.13.9. This is due to the plugin storing full payment card details (PAN, card holder name, expiry month/year, and CVV) in WordPress post_meta using base64_encode(), and then embedding these values into the publicly accessible mspaylink page's inline JavaScript without any authentication or authorization check. This makes it possible for unauthenticated attackers who know or can guess an order_id to access the mspaylink endpoint and retrieve full credit card numbers and CVV codes directly from the HTML/JS response, constituting a severe PCI-DSS violation.
Title Money Space <= 2.13.9 - Unauthenticated Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:01:46.647Z

Reserved: 2025-11-18T18:31:10.599Z

Link: CVE-2025-13371

cve-icon Vulnrichment

Updated: 2026-01-07T14:51:50.811Z

cve-icon NVD

Status : Deferred

Published: 2026-01-07T12:16:47.583

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13371

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:00:07Z

Weaknesses