Impact
In the Total Processing Card Payments plugin for WooCommerce, an improper neutralization of input during web page generation allows reflected cross-site scripting. The flaw lets an attacker supply crafted input that is incorporated into a page output and then executed by any browser that renders the page. The vulnerability is a typical XSS weakness (CWE-79).
Affected Systems
WordPress sites that employ the Total Processing Card Payments plugin (also known as Nomupay Payment Processing Gateway) with a version of 7.1.6 or earlier are affected. Versions newer than 7.1.6 are not impacted.
Risk and Exploitability
The vulnerability has a CVSS score of 7.1, indicating high severity. However, the EPSS score is below 1%, suggesting a low likelihood of immediate exploitation. The issue is not listed in the CISA KEV catalog. An attacker can exploit the vulnerability by providing malicious input that the plugin reflects in the generated page, causing the browser to execute arbitrary JavaScript.
OpenCVE Enrichment
EUVD