Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15400: CWE-862 Missing Authorization in Pix para Woocommerce

0
Unknown
VulnerabilityCVE-2025-15400cvecve-2025-15400cwe-862
Published: Wed Feb 11 2026 (02/11/2026, 06:00:03 UTC)
Source: CVE Database V5
Product: Pix para Woocommerce

Description

The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.

AI-Powered Analysis

AILast updated: 02/11/2026, 06:30:46 UTC

Technical Analysis

CVE-2025-15400 is a security vulnerability categorized under CWE-862 (Missing Authorization) affecting the Pix para Woocommerce WordPress plugin through version 2.13.3. The flaw arises because the plugin exposes AJAX endpoints that allow resetting critical payment gateway configuration options without verifying the user's capabilities or validating nonces. This means any authenticated user, including those with minimal privileges such as subscribers, can trigger actions that clear API credentials and webhook status related to the OpenPix payment gateway. The consequence is a persistent disruption of payment processing functionality, as the plugin loses its ability to authenticate and communicate with OpenPix services. The vulnerability does not require administrative privileges or additional user interaction beyond logging in. Since payment gateway configurations are sensitive and essential for transaction processing, unauthorized resets can lead to denial of service for payment acceptance, potentially causing financial loss and reputational damage. No CVSS score has been assigned yet, and no patches or fixes have been published at the time of disclosure. The vulnerability was reserved at the end of 2025 and published in early 2026. There are no known exploits in the wild, but the simplicity of exploitation and the critical nature of payment processing make this a high-risk issue for affected sites. Organizations using this plugin should consider immediate mitigations to prevent unauthorized access to these AJAX actions.

Potential Impact

For European organizations using the Pix para Woocommerce plugin to process OpenPix payments, this vulnerability poses a significant risk of payment service disruption. Attackers with any authenticated user account can reset payment gateway credentials, causing denial of service for payment acceptance. This can lead to lost revenue, customer dissatisfaction, and potential reputational harm. Since OpenPix is a popular payment method in Brazil and increasingly adopted by businesses targeting Brazilian customers, European companies engaged in e-commerce with Brazilian clients are particularly exposed. The disruption could also impact financial reconciliation and operational workflows dependent on automated payment processing. While the vulnerability does not directly expose sensitive data, the loss of payment functionality can have cascading effects on business continuity and customer trust. The lack of authentication checks means insider threats or compromised low-privilege accounts can easily exploit this flaw, increasing the attack surface. The absence of a patch increases the window of exposure, making timely mitigation critical.

Mitigation Recommendations

Until an official patch is released, European organizations should implement specific mitigations to reduce risk. First, restrict user roles that can authenticate on the WordPress site to trusted personnel only, minimizing the number of accounts that could exploit the vulnerability. Disable or remove the Pix para Woocommerce plugin if payment processing via OpenPix is not immediately required or if alternative payment methods are available. Employ web application firewalls (WAF) to block or monitor suspicious AJAX requests targeting the vulnerable endpoints. Review and harden WordPress user permissions to ensure minimal privilege principles are enforced. Monitor logs for unusual activity related to payment configuration changes. Consider implementing multi-factor authentication (MFA) for all authenticated users to reduce the risk of account compromise. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. Finally, prepare incident response plans to quickly restore payment gateway configurations if unauthorized resets occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-31T14:58:36.688Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698c1eb04b57a58fa179b72b

Added to database: 2/11/2026, 6:16:16 AM

Last enriched: 2/11/2026, 6:30:46 AM

Last updated: 2/11/2026, 11:20:35 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats