Wordpress RCE Vulnerability (CVE-2026-1937)
CVE-2026-1937
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yayma...
Overview
A critical security vulnerability has been identified in the YayMail – WooCommerce Email Customizer plugin for WordPress. This flaw allows authenticated attackers to take full control of affected websites.
Vulnerability Explained
In simple terms, the plugin is missing a critical security check on one of its functions. This function, intended for administrators, is accessible to users with lower-level privileges, specifically the “Shop Manager” role in WooCommerce.
Because this security check is absent, a user with Shop Manager access can send a specially crafted request to the website. This request can modify any configuration setting within the WordPress installation.
Potential Impact
The impact of this vulnerability is severe. An attacker with Shop Manager access can exploit it to:
- Change the default user registration role to “Administrator.”
- Enable user registration if it is disabled.
- Register a new account for themselves with full administrative privileges.
This grants the attacker complete control over the WordPress site, allowing them to deface it, steal sensitive customer data, install backdoors, or inject malicious code. Given that the Shop Manager role is commonly assigned to trusted staff, the risk of insider threat or compromised staff accounts is significant.
Remediation and Mitigation
Immediate action is required to protect your website.
Primary Remediation:
- Update the Plugin: The plugin developers have released a fix in a version newer than 4.3.2. Immediately update the YayMail plugin to the latest available version. This is the only complete solution.
Immediate Mitigation (If Update is Not Instantly Possible):
- Review User Roles: Audit and minimize the number of users assigned the Shop Manager or Administrator role. Ensure only absolutely necessary, trusted personnel have this access.
- Consider Temporary Deactivation: If you cannot update immediately and do not critically need the plugin’s functionality, consider deactivating the YayMail plugin until the update can be safely applied.
- Monitor for Suspicious Users: Check your WordPress user list for any newly created administrator accounts that you do not recognize.
All users of the YayMail plugin for WordPress prior to version 4.3.3 should treat this as a high-priority security issue.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The WowRevenue plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check in the 'Notice::install_activate_plugin' function in all versions up to, and inc...
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for un...
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callb...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...