Vulnerability Description
The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mp_pix_image' WooCommerce API endpoint in all versions up to, and including, 8.7.11. This makes it possible for unauthenticated attackers to retrieve PIX payment QR code images for arbitrary orders. PIX QR codes contain sensitive merchant information including PIX keys (which may be CPF/CNPJ personal identifiers), transaction amounts, merchant name and city, and MercadoPago transaction references.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/woocommerce-mercadopago/tags/8.7.10/s
- https://plugins.trac.wordpress.org/browser/woocommerce-mercadopago/tags/8.7.10/s
- https://plugins.trac.wordpress.org/changeset?old_path=%2Fwoocommerce-mercadopago
- https://www.wordfence.com/threat-intel/vulnerabilities/id/986e0252-b94d-4ac8-908
FAQ
What is CVE-2026-3208?
CVE-2026-3208 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mp_pix_image' WooCommerce API endpoint in all vers...
How severe is CVE-2026-3208?
CVE-2026-3208 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3208?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.