Home

Description

The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-18 | Updated 2026-02-18 | Assigner Wordfence




LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-05:Vendor Notified
2026-02-17:Disclosed

Credits

whizzu finder

References

www.wordfence.com/...-5a2d-47ab-9dfe-2f2f5f324f0d?source=cve

plugins.trac.wordpress.org/...aymail/tags/4.3.2/src/Ajax.php

plugins.trac.wordpress.org/...ser/yaymail/trunk/src/Ajax.php

plugins.trac.wordpress.org/...ontrollers/AddonController.php

plugins.trac.wordpress.org/...0yaymail&sfp_email=&sfph_mail=

cve.org (CVE-2026-1831)

nvd.nist.gov (CVE-2026-1831)

Download JSON