Home

Description

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PUBLISHED Reserved 2026-02-04 | Published 2026-02-18 | Updated 2026-02-18 | Assigner Wordfence




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-05:Vendor Notified
2026-02-17:Disclosed

Credits

whizzu finder

References

www.wordfence.com/...-340d-494f-be7e-2550dab360bc?source=cve

plugins.trac.wordpress.org/.../src/Models/MigrationModel.php

plugins.trac.wordpress.org/.../src/Models/MigrationModel.php

plugins.trac.wordpress.org/...0yaymail&sfp_email=&sfph_mail=

cve.org (CVE-2026-1937)

nvd.nist.gov (CVE-2026-1937)

Download JSON