Description
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2026-03-13
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Pix for WooCommerce plugin for WordPress allows unauthenticated users to upload arbitrary files because the lkn_pix_for_woocommerce_c6_save_settings function lacks a capability check and file type validation. This flaw is a single-step vulnerability that can lead to remote code execution if an attacker uploads a malicious script to the server. The weakness is identified as CWE-434.

Affected Systems

All installations of the Pix for WooCommerce plugin from linknacional with version 1.5.0 or earlier are affected. No specific build numbers are listed beyond the upper bound of 1.5.0.

Risk and Exploitability

The vulnerability has a CVSS score of 9.8, indicating critical severity. The EPSS score is below 1%, suggesting a low probability of exploitation at this time. It is not listed in the CISA KEV catalog, indicating no known widespread exploitation. Attackers can exploit the flaw by sending an unauthenticated request to the affected plugin’s settings handler, uploading a malicious file that is then accessible to the web server.

Generated by OpenCVE AI on March 19, 2026 at 15:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Pix for WooCommerce to the latest available version (post-1.5.0).
  • Verify that the updated plugin is in use and remove any older copies from the site.
  • Restrict file permissions on the uploads directory to prevent execution of arbitrary files.
  • Monitor web application logs for suspicious upload activity and audit the uploads folder regularly.

Generated by OpenCVE AI on March 19, 2026 at 15:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Linknacional
Linknacional pix For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Linknacional
Linknacional pix For Woocommerce
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
Description The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Pix for WooCommerce <= 1.5.0 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Linknacional Pix For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:41:11.061Z

Reserved: 2026-03-10T16:35:27.271Z

Link: CVE-2026-3891

cve-icon Vulnrichment

Updated: 2026-03-13T14:12:20.990Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:10.983

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-3891

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:59:45Z

Weaknesses