Critical severity9.8NVD Advisory· Published Mar 13, 2026· Updated Apr 22, 2026
CVE-2026-3891
CVE-2026-3891
Description
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/browser/payment-gateway-pix-for-woocommerce/tags/1.4.0/Includes/LknPaymentPixForWoocommercePixC6.phpnvd
- plugins.trac.wordpress.org/changeset/3480639/payment-gateway-pix-for-woocommercenvd
- www.wordfence.com/threat-intel/vulnerabilities/id/20188fd3-c330-4c76-912b-72731e14c450nvd
News mentions
0No linked articles in our index yet.