PrintXtore – Printing Services & Design Online WordPress WooCommerc…

PrintXtore – Printing Services & Design Online WordPress WooCommerc…

by | Feb 26, 2026 | Themes

Attack Vectors

PrintXtore – Printing Services & Design Online WordPress WooCommerce Theme (slug: bw-printxtore) versions below 1.7.7 are affected by a High-severity vulnerability (CVE-2025-28946, CVSS 8.1). Because it is unauthenticated, an attacker does not need a valid login to attempt exploitation over the internet.

In practical terms, this type of issue can be targeted by automated scanners that look for exposed WordPress sites running specific themes and versions, then attempt requests designed to force the server to load files it should never expose or execute.

Security Weakness

CVE-2025-28946 is a Local File Inclusion (LFI) weakness in PrintXtore versions up to (but not including) 1.7.7. LFI vulnerabilities occur when a website accepts a file path or file reference and does not sufficiently restrict what can be loaded.

According to the advisory, this can allow an unauthenticated attacker to include and execute arbitrary files on the server, enabling outcomes such as bypassing access controls, obtaining sensitive data, or achieving code execution in scenarios where “safe” file types (like images) can be uploaded and then included.

Technical or Business Impacts

With a High severity rating and a CVSS score of 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), the potential impact to business operations can be significant if exploitation succeeds. Risks include:

Data exposure (confidentiality): sensitive information could be accessed, including configuration details and other files that increase the likelihood of broader compromise.

Website compromise (integrity): if code execution is achieved, attackers may alter site content, inject malicious redirects, or add hidden backdoors—directly affecting brand trust and campaign performance.

Downtime and revenue disruption (availability): compromised sites may be defaced, taken offline, or flagged by browsers and ad platforms, disrupting lead generation and eCommerce transactions.

Compliance and incident costs: an intrusion that exposes personal data can trigger legal/compliance obligations, incident response costs, and reputational damage—especially for organizations handling customer accounts, orders, or payment-related workflows.

Remediation: Update PrintXtore to version 1.7.7 or newer. Reference: CVE-2025-28946 and the published advisory from Wordfence: Wordfence vulnerability record.

Similar Attacks

Local file inclusion and closely related path traversal vulnerabilities are frequently used to move from “information exposure” to deeper compromise. A few widely referenced examples include:

CVE-2021-41773 (Apache HTTP Server 2.4.49 Path Traversal) — allowed attackers to access files outside the intended web directory under certain configurations.

CVE-2019-19781 (Citrix ADC/Gateway Directory Traversal) — widely exploited to access files and enable further compromise.

CVE-2018-13379 (Fortinet FortiOS SSL VPN Path Traversal) — used to read sensitive files and support credential theft and follow-on attacks.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers