Impact
The Slek Gateway for WooCommerce plugin stores the merchant’s slek_key and slek_secret directly in a client‑side HTML form and also places the slek_secret as a plaintext GET parameter in the IPN callback URL. This flaw allows an attacker to view these credentials by inspecting the HTML source of the WooCommerce order‑pay page before the form auto‑submits, thereby exposing sensitive API credentials.
Affected Systems
The vulnerability affects the 1.0 release of the Slek Gateway for WooCommerce plugin distributed by qqqjus. Any WordPress site that employs this plugin version is at risk if it uses WooCommerce for order processing.
Risk and Exploitability
The CVSS score for the flaw is 5.3, EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Attackers need not be authenticated; they simply place an order and view the order‑pay page source before automatic submission. Because no exploitation data are available, the likelihood of exploitation is uncertain, but the moderate severity and the ease of execution suggest a credible risk.
OpenCVE Enrichment