Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1258: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

0
Medium
VulnerabilityCVE-2026-1258cvecve-2026-1258cwe-89
Published: Sat Feb 14 2026 (02/14/2026, 08:26:48 UTC)
Source: CVE Database V5
Vendor/Project: getwpfunnels
Product: Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

Description

The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map' API endpoints in all versions up to, and including, 1.19.2 . This is due to insufficient escaping on the user supplied 'order-by', 'order-type', and 'selectedCourses' parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for authenticated attackers, with administrator level access and above, to append additional SQL queries into already existing queries.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 22:19:11 UTC

Technical Analysis

CVE-2026-1258 is a blind SQL Injection vulnerability identified in the Mail Mint plugin for WordPress, which is widely used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The flaw exists in all versions up to and including 1.19.2 and arises from improper neutralization of special elements in SQL commands (CWE-89). Specifically, the vulnerability is due to insufficient escaping and lack of prepared statements for user-supplied parameters such as 'order-by', 'order-type', and 'selectedCourses' in several API endpoints including 'forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map'. An attacker with administrator-level access can exploit this by appending additional SQL queries to existing ones, enabling blind SQL Injection attacks. This can allow unauthorized reading of sensitive database information without direct feedback (blind), potentially exposing confidential data. The vulnerability requires authenticated access with high privileges but does not require user interaction, and no known public exploits have been reported yet. The CVSS v3.1 base score is 4.9, reflecting medium severity, with the attack vector being network-based, low attack complexity, and high privileges required. The scope is unchanged, and the impact affects confidentiality but not integrity or availability. The vulnerability highlights the importance of proper input validation and use of parameterized queries in WordPress plugins handling sensitive data.

Potential Impact

The primary impact of CVE-2026-1258 is unauthorized disclosure of sensitive information stored in the backend database of affected WordPress sites using the Mail Mint plugin. Since the vulnerability allows blind SQL Injection, attackers can extract data such as user information, email lists, marketing data, and potentially other sensitive business information. This can lead to privacy violations, intellectual property theft, and reputational damage. Although the vulnerability does not affect data integrity or availability, the exposure of confidential data can have severe consequences, including regulatory penalties under data protection laws like GDPR or CCPA. Organizations relying on Mail Mint for email marketing and automation may face operational disruptions if attackers leverage the vulnerability to gather intelligence for further attacks. The requirement for administrator-level access limits exploitation to insiders or compromised admin accounts, but this also means that attackers who gain such access can escalate their capabilities significantly. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability remains a critical concern for organizations with high-value data in their marketing platforms.

Mitigation Recommendations

To mitigate CVE-2026-1258, organizations should immediately update the Mail Mint plugin to a patched version once available from the vendor. Until a patch is released, administrators should restrict access to the WordPress admin panel to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Review and limit plugin permissions to the minimum necessary. Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the vulnerable API endpoints and parameters ('order-by', 'order-type', 'selectedCourses'). Conduct regular security audits and code reviews of custom plugins and integrations to ensure proper input validation and use of parameterized queries. Monitor logs for unusual database query patterns or failed injection attempts. Educate administrators on the risks of SQL injection and the importance of secure coding practices. Consider isolating the WordPress environment and database with network segmentation to limit lateral movement if exploitation occurs. Backup critical data regularly and verify restoration procedures to minimize impact from potential attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T20:05:01.189Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69903384c9e1ff5ad8746a1b

Added to database: 2/14/2026, 8:34:12 AM

Last enriched: 2/21/2026, 10:19:11 PM

Last updated: 3/31/2026, 10:56:39 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses