CVE-2026-1051: CWE-352 Cross-Site Request Forgery (CSRF) in satollo Newsletter – Send awesome emails from WordPress
CVE-2026-1051 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 9. 1. 0 of the WordPress plugin 'Newsletter – Send awesome emails from WordPress' by satollo. The vulnerability arises from missing or incorrect nonce validation in the hook_newsletter_action() function, allowing unauthenticated attackers to trick logged-in users into unsubscribing newsletter subscribers via forged requests. Exploitation requires user interaction but no authentication by the attacker. While no known exploits are currently reported in the wild, the vulnerability can impact newsletter subscriber management integrity. European organizations using this plugin on WordPress sites should prioritize patching or implementing mitigations to prevent unauthorized subscriber unsubscriptions. Countries with high WordPress usage and significant digital marketing activities are more likely to be affected. The CVSS score is 4. 3, reflecting a medium severity due to limited impact on confidentiality and availability but a potential integrity impact on subscriber data.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-1051 affects the 'Newsletter – Send awesome emails from WordPress' plugin, widely used to manage email newsletters on WordPress sites. The root cause is a Cross-Site Request Forgery (CSRF) flaw stemming from missing or incorrect nonce validation in the hook_newsletter_action() function. Nonces in WordPress are security tokens designed to verify that a request originates from a legitimate source and user intent. Without proper nonce validation, attackers can craft malicious URLs or web pages that, when visited or clicked by an authenticated user, cause unintended actions—in this case, unsubscribing newsletter subscribers. The vulnerability does not require the attacker to be authenticated but does require that the victim user is logged into the WordPress site and interacts with the malicious content. The impact is limited to the integrity of newsletter subscriber lists, as attackers can remove subscribers without authorization. There is no direct impact on confidentiality or availability of the system. The CVSS 3.1 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). No patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of newsletter subscriber data by enabling unauthorized unsubscriptions. This can disrupt marketing campaigns, reduce subscriber engagement, and potentially damage brand reputation. While it does not compromise sensitive data confidentiality or system availability, the manipulation of subscriber lists can lead to loss of customer trust and operational inefficiencies. Organizations relying heavily on email marketing through WordPress sites using this plugin are at risk of targeted attacks aiming to sabotage their communication channels. Additionally, repeated or large-scale exploitation could indirectly affect business continuity by degrading the effectiveness of outreach efforts. The requirement for user interaction and logged-in status limits the attack surface but does not eliminate risk, especially in environments with many authenticated users or administrators.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Newsletter – Send awesome emails from WordPress' plugin to a version that includes proper nonce validation once available. In the absence of an official patch, administrators can implement custom nonce checks in the hook_newsletter_action() function to validate requests. Additionally, organizations should educate users about the risks of clicking suspicious links while logged into administrative or user accounts on WordPress sites. Employing Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide an additional layer of defense. Restricting user roles and permissions to the minimum necessary reduces the number of users who can be tricked into executing harmful actions. Regularly auditing plugin usage and monitoring logs for unusual unsubscribe activity can help detect exploitation attempts early. Finally, consider implementing multi-factor authentication (MFA) for WordPress accounts to reduce the risk of session hijacking that could facilitate CSRF attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1051: CWE-352 Cross-Site Request Forgery (CSRF) in satollo Newsletter – Send awesome emails from WordPress
Description
CVE-2026-1051 is a medium-severity Cross-Site Request Forgery (CSRF) vulnerability affecting all versions up to 9. 1. 0 of the WordPress plugin 'Newsletter – Send awesome emails from WordPress' by satollo. The vulnerability arises from missing or incorrect nonce validation in the hook_newsletter_action() function, allowing unauthenticated attackers to trick logged-in users into unsubscribing newsletter subscribers via forged requests. Exploitation requires user interaction but no authentication by the attacker. While no known exploits are currently reported in the wild, the vulnerability can impact newsletter subscriber management integrity. European organizations using this plugin on WordPress sites should prioritize patching or implementing mitigations to prevent unauthorized subscriber unsubscriptions. Countries with high WordPress usage and significant digital marketing activities are more likely to be affected. The CVSS score is 4. 3, reflecting a medium severity due to limited impact on confidentiality and availability but a potential integrity impact on subscriber data.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-1051 affects the 'Newsletter – Send awesome emails from WordPress' plugin, widely used to manage email newsletters on WordPress sites. The root cause is a Cross-Site Request Forgery (CSRF) flaw stemming from missing or incorrect nonce validation in the hook_newsletter_action() function. Nonces in WordPress are security tokens designed to verify that a request originates from a legitimate source and user intent. Without proper nonce validation, attackers can craft malicious URLs or web pages that, when visited or clicked by an authenticated user, cause unintended actions—in this case, unsubscribing newsletter subscribers. The vulnerability does not require the attacker to be authenticated but does require that the victim user is logged into the WordPress site and interacts with the malicious content. The impact is limited to the integrity of newsletter subscriber lists, as attackers can remove subscribers without authorization. There is no direct impact on confidentiality or availability of the system. The CVSS 3.1 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). No patches or exploits are currently reported, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability primarily threatens the integrity of newsletter subscriber data by enabling unauthorized unsubscriptions. This can disrupt marketing campaigns, reduce subscriber engagement, and potentially damage brand reputation. While it does not compromise sensitive data confidentiality or system availability, the manipulation of subscriber lists can lead to loss of customer trust and operational inefficiencies. Organizations relying heavily on email marketing through WordPress sites using this plugin are at risk of targeted attacks aiming to sabotage their communication channels. Additionally, repeated or large-scale exploitation could indirectly affect business continuity by degrading the effectiveness of outreach efforts. The requirement for user interaction and logged-in status limits the attack surface but does not eliminate risk, especially in environments with many authenticated users or administrators.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately update the 'Newsletter – Send awesome emails from WordPress' plugin to a version that includes proper nonce validation once available. In the absence of an official patch, administrators can implement custom nonce checks in the hook_newsletter_action() function to validate requests. Additionally, organizations should educate users about the risks of clicking suspicious links while logged into administrative or user accounts on WordPress sites. Employing Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide an additional layer of defense. Restricting user roles and permissions to the minimum necessary reduces the number of users who can be tricked into executing harmful actions. Regularly auditing plugin usage and monitoring logs for unusual unsubscribe activity can help detect exploitation attempts early. Finally, consider implementing multi-factor authentication (MFA) for WordPress accounts to reduce the risk of session hijacking that could facilitate CSRF attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-16T16:43:52.499Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696edf804623b1157ce5dbec
Added to database: 1/20/2026, 1:50:56 AM
Last enriched: 1/27/2026, 8:21:18 PM
Last updated: 2/6/2026, 5:27:25 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumCVE-2026-25698
LowCVE-2026-25697
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.