{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T04:17:45.639","vulnerabilities":[{"cve":{"id":"CVE-2025-32209","sourceIdentifier":"audit@patchstack.com","published":"2025-04-10T08:15:17.983","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Nomupay Payment Processing Gateway totalprocessing-card-payments allows Path Traversal.This issue affects Nomupay Payment Processing Gateway: from n/a through <= 7.1.5."},{"lang":"es","value":"Vulnerabilidad de limitación incorrecta de una ruta de acceso a un directorio restringido ('Path Traversal') en totalprocessing Total processing card payments for WooCommerce permite el recorrido de ruta. Este problema afecta a Total processing card payments for WooCommerce: desde n/d hasta 7.1.5."}],"metrics":{},"weaknesses":[{"source":"audit@patchstack.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://patchstack.com/database/Wordpress/Plugin/totalprocessing-card-payments/vulnerability/wordpress-total-processing-card-payments-for-woocommerce-plugin-7-1-3-arbitrary-file-download-vulnerability?_s_id=cve","source":"audit@patchstack.com"}]}}]}