{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T08:51:06.743","vulnerabilities":[{"cve":{"id":"CVE-2025-46486","sourceIdentifier":"audit@patchstack.com","published":"2025-05-23T13:15:35.827","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in totalprocessing Nomupay Payment Processing Gateway totalprocessing-card-payments allows Path Traversal.This issue affects Nomupay Payment Processing Gateway: from n/a through <= 7.1.7."},{"lang":"es","value":"Vulnerabilidad de limitación incorrecta de una ruta a un directorio restringido (Path Traversal) en totalprocessing Nomupay Payment Processing Gateway permite el Path Traversal. Este problema afecta a la pasarela de procesamiento de pagos Nomupay desde n/d hasta la versión 7.1.7."}],"metrics":{},"weaknesses":[{"source":"audit@patchstack.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://patchstack.com/database/Wordpress/Plugin/totalprocessing-card-payments/vulnerability/wordpress-nomupay-payment-processing-gateway-7-1-7-arbitrary-file-download-vulnerability?_s_id=cve","source":"audit@patchstack.com"}]}}]}