Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PoloPag PoloPag – Pix Automático para Woocommerce wc-polo-payments allows PHP Local File Inclusion.This issue affects PoloPag – Pix Automático para Woocommerce: from n/a through <= 2.0.9.
Published: 2025-11-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper control of the filename used in PHP include/require statements in the PoloPag – Pix Automático para Woocommerce plugin allows an attacker to cause the server to include an arbitrary local file. This flaw is a classical PHP Local File Inclusion vulnerability (CWE‑98) that can enable an unauthenticated user to read sensitive files or, if the server permits execution of the included files, to potentially execute malicious code. The impact is loss of confidentiality, integrity, or availability of the WordPress site's files and configuration.

Affected Systems

The vulnerability affects the PoloPag – Pix Automático para Woocommerce plugin (wc‑polo‑payments) for all installed versions from the first release through and including version 2.0.9. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity level for the vulnerability, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term, and the issue is currently not listed in the CISA KEV catalog. The likely attack vector is a crafted HTTP request to the plugin’s exposed endpoint that manipulates the include path parameter. Based on the description, if the attacker can successfully trigger the LFI, they could read local files, and if the server allows execution of the included files, they could potentially run arbitrary code; this latter consequence is inferred.

Generated by OpenCVE AI on April 29, 2026 at 16:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the PoloPag – Pix Automático para Woocommerce plugin to a version newer than 2.0.9 when a vendor patch becomes available.
  • If an immediate update is not possible, remove or disable the plugin from the WordPress installation so that the vulnerable code path cannot be reached.
  • Configure the web server to restrict access to sensitive directories (e.g., wp-content, .htaccess, plugins) and apply file‑inclusion hardening rules or disable PHP’s ability to include arbitrary files.

Generated by OpenCVE AI on April 29, 2026 at 16:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PoloPag PoloPag &#8211; Pix Automático para Woocommerce wc-polo-payments allows PHP Local File Inclusion.This issue affects PoloPag &#8211; Pix Automático para Woocommerce: from n/a through <= 2.0.9. Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PoloPag PoloPag – Pix Automático para Woocommerce wc-polo-payments allows PHP Local File Inclusion.This issue affects PoloPag – Pix Automático para Woocommerce: from n/a through <= 2.0.9.

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 17 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Polopag
Polopag polopag
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Polopag
Polopag polopag
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PoloPag PoloPag &#8211; Pix Automático para Woocommerce wc-polo-payments allows PHP Local File Inclusion.This issue affects PoloPag &#8211; Pix Automático para Woocommerce: from n/a through <= 2.0.9.
Title WordPress PoloPag – Pix Automático para Woocommerce plugin <= 2.0.9 - Local File Inclusion vulnerability
Weaknesses CWE-98
References

Subscriptions

Polopag Polopag
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:40:03.051Z

Reserved: 2025-09-25T15:28:34.981Z

Link: CVE-2025-60189

cve-icon Vulnrichment

Updated: 2025-11-17T14:54:46.641Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:16:03.717

Modified: 2026-04-28T19:34:41.367

Link: CVE-2025-60189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:15:15Z

Weaknesses