CVE-2025-15400
Description
The OpenPix for WooCommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated users can reset OpenPix payment gateway settings in WooCommerce plugin through 2.13.3 due to missing capability and nonce checks, disrupting payment functionality.
The OpenPix for WooCommerce plugin through version 2.13.3 contains a missing authorization vulnerability in its AJAX handlers. The plugin fails to perform capability checks or include nonce verification on several AJAX actions that reset payment gateway configuration options, such as API credentials and webhook status [1]. This oversight allows any authenticated user, regardless of their role, to trigger these actions.
Exploitation requires only an active user session; even subscribers or customers can send the crafted AJAX requests. No special permissions are needed, and there is no protection against cross-site request forgery (CSRF) due to the missing nonce check. The attacker simply needs to be logged into a WordPress account with any role.
The immediate impact is the disruption of OpenPix payment processing. Once an attacker resets the gateway settings, the store can no longer process payments via OpenPix until an administrator manually re-enters the correct API credentials and re-enables webhooks. This can cause persistent financial loss and operational disruption.
As of the publication date, no patch is available for this vulnerability. The plugin is likely unmaintained. Sites using the OpenPix for WooCommerce plugin should consider disabling it or migrating to an alternative payment gateway to mitigate the risk [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=2.13.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.