CVE-2026-3891

9.8 CRITICAL
Published: March 13, 2026 Modified: March 16, 2026
View on NVD

Description

The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI Explanation

### 1. **Plain-Language Summary** The Pix for WooCommerce WordPress plugin has a critical flaw allowing anyone (without logging in) to upload any file type to the server due to broken access controls and missing file type checks. This could let attackers execute malicious code on the site. ### 2. **Who is Affected** - **Product**: Pix for WooCommerce plugin for WordPress. - **Versions**: All versions up to and including **1.5.0**. Sites using these versions are vulnerable. ### 3. **Attacker Impact** Unauthenticated attackers can upload **any file** (e.g., malicious scripts, backdoors). This may lead to **remote code execution (RCE)**, enabling them to: - Fully compromise the website/server. - Steal sensitive data or install malware. - Use the server for attacks on other systems. ### 4. **Recommended Remediation Steps** 1. **Update Immediately**: Upgrade the Pix for WooCommerce plugin to a version **newer than 1.5.0** (if available). Check the plugin’s official repository for patched releases. 2. **Mitigate if Unpatched**: - **Disable/Remove** the plugin if no patch exists. - **Review Server Files**: Audit uploads for suspicious files (e.g., `.php`, `.jsp`) in directories like `/wp-content/uploads/` and delete them. 3. **Restrict Access**: Use Web Application Firewall (WAF) rules to block unauthorized upload attempts. 4. **Monitor**: Check logs for unusual file upload activities (e.g., `POST` requests to vulnerable endpoints). **Note**: Given the **CVSS 9.8 (Critical)** severity, prioritize patching within hours.**Sources**: - [CVE-2026-3891](https://cve.mitre.org) - [WordPress Plugin Directory](https://wordpress.org/plugins/pix-for-woocommerce/)

Generated: 2026-03-14 15:40

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.2%
38th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)