Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1000: CWE-862 Missing Authorization in mailerlite MailerLite – WooCommerce integration

0
Medium
VulnerabilityCVE-2026-1000cvecve-2026-1000cwe-862
Published: Fri Jan 16 2026 (01/16/2026, 04:44:35 UTC)
Source: CVE Database V5
Vendor/Project: mailerlite
Product: MailerLite – WooCommerce integration

Description

CVE-2026-1000 is a medium-severity vulnerability in the MailerLite – WooCommerce integration WordPress plugin (versions up to 3. 1. 3). It arises from missing authorization checks in the resetIntegration() function, allowing authenticated users with Subscriber-level access or higher to reset integration settings, delete plugin options, and drop critical plugin database tables. This leads to loss of abandoned cart data and sync job history, impacting data integrity but not confidentiality or availability. Exploitation requires no user interaction but does require authenticated access at a low privilege level. No known exploits are currently reported in the wild. European organizations using this plugin in their WooCommerce stores risk disruption of marketing and sales data, especially those relying on abandoned cart recovery. Mitigation involves applying patches when available, restricting Subscriber roles from accessing plugin functions, and monitoring database integrity. Countries with high WooCommerce adoption and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 01/16/2026, 05:13:04 UTC

Technical Analysis

The CVE-2026-1000 vulnerability affects the MailerLite – WooCommerce integration plugin for WordPress, specifically all versions up to and including 3.1.3. The root cause is a missing authorization check (CWE-862) in the resetIntegration() function, which does not verify whether the authenticated user has sufficient privileges before allowing critical operations. As a result, any user with Subscriber-level access or higher can invoke this function to reset the plugin's integration settings, delete all plugin options, and drop the plugin’s database tables named woo_mailerlite_carts and woo_mailerlite_jobs. These tables store important data such as customer abandoned cart information and synchronization job history. The vulnerability does not expose confidential data directly but severely impacts data integrity by enabling unauthorized modification and deletion of plugin data. The attack vector is remote and network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and affects the integrity of the system (I:H) without impacting confidentiality (C:N) or availability (A:N). No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability was published on January 16, 2026, and assigned a CVSS v3.1 score of 6.5, categorized as medium severity.

Potential Impact

For European organizations using WooCommerce with the MailerLite integration plugin, this vulnerability can lead to significant disruption of marketing automation and e-commerce operations. The loss of abandoned cart data and sync job history can degrade customer engagement and reduce sales recovery opportunities. Although the vulnerability does not compromise customer personal data confidentiality, the integrity loss can undermine trust in the e-commerce platform’s reliability and data accuracy. Organizations relying on this plugin for automated email marketing and cart recovery may experience operational setbacks and increased manual workload to restore lost data. The requirement for only Subscriber-level access means that even low-privileged users or compromised accounts could exploit this flaw, increasing the risk of insider threats or lateral movement attacks. This could be particularly impactful for small to medium-sized enterprises that rely heavily on WooCommerce and MailerLite for their online sales and marketing workflows.

Mitigation Recommendations

Immediate mitigation should focus on restricting Subscriber-level users from accessing or invoking the resetIntegration() function. Administrators should audit user roles and permissions to ensure that only trusted users have access to plugin management features. Until an official patch is released, consider disabling or removing the MailerLite – WooCommerce integration plugin if it is not critical. Regularly back up the WordPress database, including plugin-specific tables, to enable recovery in case of data deletion. Monitor logs for unusual activities related to plugin settings changes or database table drops. Employ WordPress security plugins that can enforce capability checks and alert on unauthorized changes. Once a patch is available, apply it promptly. Additionally, implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-15T16:35:54.267Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6969c56d7c726673b6f0ba84

Added to database: 1/16/2026, 4:58:21 AM

Last enriched: 1/16/2026, 5:13:04 AM

Last updated: 1/16/2026, 6:18:59 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats