Metrics
Affected Vendors & Products
Solution
Update the WordPress Nomupay Payment Processing Gateway wordpress plugin to the latest available version (at least 7.1.8).
Workaround
No workaround given by the vendor.
Fri, 23 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 23 May 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Nomupay Payment Processing Gateway allows Path Traversal. This issue affects Nomupay Payment Processing Gateway: from n/a through 7.1.7. | |
Title | WordPress Nomupay Payment Processing Gateway <= 7.1.7 - Arbitrary File Download Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-05-23T14:50:52.917Z
Reserved: 2025-04-24T14:22:54.404Z
Link: CVE-2025-46486

Updated: 2025-05-23T14:50:49.588Z

Status : Awaiting Analysis
Published: 2025-05-23T13:15:35.827
Modified: 2025-05-23T15:54:42.643
Link: CVE-2025-46486

No data.

No data.