VYPR
Medium severity6.5NVD Advisory· Published Feb 11, 2026· Updated Apr 15, 2026

CVE-2025-15400

CVE-2025-15400

Description

The OpenPix for WooCommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated users can reset OpenPix payment gateway settings in WooCommerce plugin through 2.13.3 due to missing capability and nonce checks, disrupting payment functionality.

The OpenPix for WooCommerce plugin through version 2.13.3 contains a missing authorization vulnerability in its AJAX handlers. The plugin fails to perform capability checks or include nonce verification on several AJAX actions that reset payment gateway configuration options, such as API credentials and webhook status [1]. This oversight allows any authenticated user, regardless of their role, to trigger these actions.

Exploitation requires only an active user session; even subscribers or customers can send the crafted AJAX requests. No special permissions are needed, and there is no protection against cross-site request forgery (CSRF) due to the missing nonce check. The attacker simply needs to be logged into a WordPress account with any role.

The immediate impact is the disruption of OpenPix payment processing. Once an attacker resets the gateway settings, the store can no longer process payments via OpenPix until an administrator manually re-enters the correct API credentials and re-enables webhooks. This can cause persistent financial loss and operational disruption.

As of the publication date, no patch is available for this vulnerability. The plugin is likely unmaintained. Sites using the OpenPix for WooCommerce plugin should consider disabling it or migrating to an alternative payment gateway to mitigate the risk [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.