Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Nomupay Payment Processing Gateway totalprocessing-card-payments allows Path Traversal.This issue affects Nomupay Payment Processing Gateway: from n/a through <= 7.1.5.
Published: 2025-04-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Totalprocessing Card Payments plugin for WooCommerce suffers from a path traversal flaw (CWE-22) that allows attackers to download arbitrary files from the server’s file system. The vulnerability arises because the plugin does not properly limit pathname resolution to a designated directory, enabling the retrieval of any file location beyond its intended scope.

Affected Systems

The vulnerable product is the WordPress Totalprocessing Card Payments plugin, also known as Nomupay Payment Processing Gateway, for all versions from the initial release through version 7.1.5. WordPress sites hosting this plugin are thus affected.

Risk and Exploitability

The CVSS score of 6.5 reflects moderate risk, while the EPSS score of less than 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be a remote web request, where an attacker crafts a URL containing traversal sequences that cause the plugin to return a requested file. Successful exploitation would grant read access to arbitrary server files, thereby compromising confidentiality. No elevated local privileges are required if the attacker can reach the vulnerable site.

Generated by OpenCVE AI on May 1, 2026 at 10:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Totalprocessing Card Payments plugin to the latest version that fixes the path traversal vulnerability.
  • If an upgrade is not possible, disable and remove the plugin from the WordPress installation to eliminate the exposure.
  • Review the file permissions on the web server to ensure that sensitive files outside the WordPress root are not world‑readable, and restrict access to the plugin’s directories.

Generated by OpenCVE AI on May 1, 2026 at 10:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10466 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Total processing card payments for WooCommerce allows Path Traversal. This issue affects Total processing card payments for WooCommerce: from n/a through 7.1.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Total processing card payments for WooCommerce allows Path Traversal. This issue affects Total processing card payments for WooCommerce: from n/a through 7.1.5. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Nomupay Payment Processing Gateway totalprocessing-card-payments allows Path Traversal.This issue affects Nomupay Payment Processing Gateway: from n/a through <= 7.1.5.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 10 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Total processing card payments for WooCommerce allows Path Traversal. This issue affects Total processing card payments for WooCommerce: from n/a through 7.1.5.
Title WordPress Total processing card payments for WooCommerce Plugin <= 7.1.5 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:19.049Z

Reserved: 2025-04-04T10:01:35.761Z

Link: CVE-2025-32209

cve-icon Vulnrichment

Updated: 2025-04-10T19:28:00.808Z

cve-icon NVD

Status : Deferred

Published: 2025-04-10T08:15:17.983

Modified: 2026-04-23T15:28:45.627

Link: CVE-2025-32209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:45:05Z

Weaknesses