Description
The OpenPix for WooCommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.
Published: 2026-02-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized payment gateway configuration reset
Action: Patch immediately
AI Analysis

Impact

The OpenPix for WooCommerce plugin through version 2.13.3 fails to validate the user's capabilities or present nonce checks when processing AJAX requests that reset payment‑gateway settings. An attacker who is any authenticated user, such as a subscriber, can therefore execute those actions and clear API credentials and webhook status. The result is a persistent loss of payment functionality rather than code execution or direct data theft. This vulnerability is an example of the missing authorization flaw described by CWE‑862.

Affected Systems

WordPress sites running the OpenPix for WooCommerce plugin of version 2.13.3 or earlier are affected. The plugin is distributed for WordPress and is referenced as Unknown:OpenPix for WooCommerce in vendor records. No other products or versions are specified.

Risk and Exploitability

With a CVSS score of 6.5 the vulnerability is classified as moderate severity. The EPSS score of less than 1% indicates a low likelihood of exploitation at this time, and it is not listed in the CISA KEV catalog. The lack of capability or nonce verification means any authenticated user can trigger the reset, so the attack vector is an authenticated, non‑privileged user role. Because the impact is limited to the configuration of the payment system and does not allow arbitrary code execution, the overall risk is moderate but can cause significant service disruption for merchants relying on OpenPix.

Generated by OpenCVE AI on April 27, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OpenPix for WooCommerce plugin to the latest version that fixes the missing authorization checks.
  • If an update is unavailable, restrict the reset AJAX endpoint to users with administrative capability and enforce a valid nonce on the request.
  • Disable or remove the AJAX reset feature for roles that do not need it, such as subscribers, to eliminate the attack surface.

Generated by OpenCVE AI on April 27, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality. The OpenPix for WooCommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Openpix
Openpix pix Para Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Openpix
Openpix pix Para Woocommerce
Wordpress
Wordpress wordpress

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.
Title OpenPix <= 2.13.3 - Subscriber+ Payment Gateway Settings Reset
References

Subscriptions

Openpix Pix Para Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:55.373Z

Reserved: 2025-12-31T14:58:36.688Z

Link: CVE-2025-15400

cve-icon Vulnrichment

Updated: 2026-02-11T15:57:29.804Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T06:15:47.870

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T21:15:05Z

Weaknesses