Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15400: CWE-862 Missing Authorization in Pix para Woocommerce

0
Medium
VulnerabilityCVE-2025-15400cvecve-2025-15400cwe-862
Published: Wed Feb 11 2026 (02/11/2026, 06:00:03 UTC)
Source: CVE Database V5
Product: Pix para Woocommerce

Description

The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:50:46 UTC

Technical Analysis

CVE-2025-15400 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Pix para Woocommerce WordPress plugin versions through 2.13.3. The flaw arises because the plugin allows any authenticated user, regardless of their capability level, to invoke AJAX actions that reset critical payment gateway configuration options. Specifically, these AJAX endpoints lack proper capability checks and nonce verification, which are standard WordPress security mechanisms to prevent unauthorized actions. As a result, even low-privilege users such as subscribers can clear API credentials and webhook statuses associated with the OpenPix payment gateway. This leads to persistent disruption of payment processing functionality, as the plugin loses its configured connection to the payment provider. The vulnerability does not expose confidential data directly but compromises the integrity of payment configurations, potentially causing denial of service for payment transactions. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, unchanged scope, no confidentiality impact, high integrity impact, and no availability impact. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability was reserved at the end of 2025 and published in early 2026 by WPScan. Given the widespread use of WordPress and WooCommerce in European e-commerce, especially in countries where Pix payment methods are integrated, this vulnerability poses a tangible risk to online merchants relying on this plugin for payment processing.

Potential Impact

For European organizations, particularly e-commerce businesses using WordPress with the Pix para Woocommerce plugin, this vulnerability can cause significant operational disruption. Attackers with any authenticated account, including low-privilege subscriber roles, can reset payment gateway configurations, effectively disabling OpenPix payment processing. This disruption can lead to loss of sales, customer dissatisfaction, and reputational damage. While the vulnerability does not expose sensitive customer data or allow direct financial theft, the integrity compromise of payment settings can indirectly facilitate fraud or financial loss if attackers manipulate payment flows. Organizations relying on automated payment processing through OpenPix may experience downtime or require manual intervention to restore configurations. The lack of patches increases exposure time, and the ease of exploitation by authenticated users heightens risk. European businesses with high transaction volumes and dependence on Pix payments are particularly vulnerable to operational and financial impacts from this flaw.

Mitigation Recommendations

To mitigate CVE-2025-15400, organizations should immediately audit user roles and permissions within their WordPress installations to restrict access to trusted administrators only. Specifically, ensure that only users with appropriate capabilities (e.g., administrators) can trigger AJAX actions related to payment gateway configuration. Implement nonce verification for all AJAX endpoints to prevent unauthorized requests. If possible, temporarily disable the Pix para Woocommerce plugin or restrict its usage until a security patch is released. Monitor logs for suspicious activity involving AJAX calls to payment configuration endpoints. Educate site administrators and users about the risk of low-privilege accounts being exploited. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts. Stay informed about plugin updates and apply patches promptly once available. Additionally, maintain regular backups of payment configuration settings to enable quick restoration if tampering occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-31T14:58:36.688Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698c1eb04b57a58fa179b72b

Added to database: 2/11/2026, 6:16:16 AM

Last enriched: 2/18/2026, 9:50:46 AM

Last updated: 3/28/2026, 7:32:16 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses