CVE-2026-1258: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map' API endpoints in all versions up to, and including, 1.19.2 . This is due to insufficient escaping on the user supplied 'order-by', 'order-type', and 'selectedCourses' parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for authenticated attackers, with administrator level access and above, to append additional SQL queries into already existing queries.
AI Analysis
Technical Summary
CVE-2026-1258 is a blind SQL Injection vulnerability identified in the Mail Mint plugin for WordPress, which is widely used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The vulnerability affects all versions up to and including 1.19.2. It stems from insufficient escaping and lack of prepared statements in SQL queries that handle user-supplied parameters such as 'order-by', 'order-type', and 'selectedCourses' across multiple API endpoints ('forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map'). An attacker with administrator-level privileges can exploit this flaw by injecting additional SQL commands into existing queries, potentially extracting sensitive information from the backend database without triggering error messages (blind SQLi). The vulnerability does not require user interaction but does require high-level privileges, limiting exploitation to insiders or compromised admin accounts. The CVSS score is 4.9 (medium), reflecting the moderate risk due to the privilege requirement and the impact limited to confidentiality. No patches or known exploits have been reported yet, but the vulnerability poses a significant risk to data confidentiality in affected environments. The plugin’s integration with WooCommerce and email marketing functions makes it a valuable target for attackers seeking customer or transactional data.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive customer and transactional data stored in WordPress databases, including personal information managed through WooCommerce and email marketing campaigns. This could result in data breaches violating GDPR requirements, leading to legal penalties and reputational damage. Since exploitation requires administrator privileges, the threat is heightened if internal accounts are compromised or if malicious insiders exist. The blind nature of the SQL Injection means attackers can stealthily extract data over time, complicating detection. Organizations relying heavily on WordPress for e-commerce and marketing automation are particularly vulnerable, potentially affecting customer trust and business continuity. Although availability and integrity are not directly impacted, the confidentiality breach alone is significant under European data protection regulations.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Implement strict input validation and sanitization on all user-supplied parameters, especially 'order-by', 'order-type', and 'selectedCourses', using whitelisting approaches. 3. Employ prepared statements with parameterized queries in the plugin’s code to prevent SQL Injection. 4. Monitor database query logs for unusual or repeated patterns indicative of blind SQL Injection attempts. 5. Regularly audit and update WordPress plugins and core software to the latest versions once patches become available. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection payloads targeting the vulnerable endpoints. 7. Educate administrators on the risks of privilege misuse and the importance of secure credential management. 8. If patching is not immediately possible, temporarily disable or restrict access to the vulnerable API endpoints to reduce attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1258: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
Description
The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map' API endpoints in all versions up to, and including, 1.19.2 . This is due to insufficient escaping on the user supplied 'order-by', 'order-type', and 'selectedCourses' parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for authenticated attackers, with administrator level access and above, to append additional SQL queries into already existing queries.
AI-Powered Analysis
Technical Analysis
CVE-2026-1258 is a blind SQL Injection vulnerability identified in the Mail Mint plugin for WordPress, which is widely used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The vulnerability affects all versions up to and including 1.19.2. It stems from insufficient escaping and lack of prepared statements in SQL queries that handle user-supplied parameters such as 'order-by', 'order-type', and 'selectedCourses' across multiple API endpoints ('forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map'). An attacker with administrator-level privileges can exploit this flaw by injecting additional SQL commands into existing queries, potentially extracting sensitive information from the backend database without triggering error messages (blind SQLi). The vulnerability does not require user interaction but does require high-level privileges, limiting exploitation to insiders or compromised admin accounts. The CVSS score is 4.9 (medium), reflecting the moderate risk due to the privilege requirement and the impact limited to confidentiality. No patches or known exploits have been reported yet, but the vulnerability poses a significant risk to data confidentiality in affected environments. The plugin’s integration with WooCommerce and email marketing functions makes it a valuable target for attackers seeking customer or transactional data.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive customer and transactional data stored in WordPress databases, including personal information managed through WooCommerce and email marketing campaigns. This could result in data breaches violating GDPR requirements, leading to legal penalties and reputational damage. Since exploitation requires administrator privileges, the threat is heightened if internal accounts are compromised or if malicious insiders exist. The blind nature of the SQL Injection means attackers can stealthily extract data over time, complicating detection. Organizations relying heavily on WordPress for e-commerce and marketing automation are particularly vulnerable, potentially affecting customer trust and business continuity. Although availability and integrity are not directly impacted, the confidentiality breach alone is significant under European data protection regulations.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Implement strict input validation and sanitization on all user-supplied parameters, especially 'order-by', 'order-type', and 'selectedCourses', using whitelisting approaches. 3. Employ prepared statements with parameterized queries in the plugin’s code to prevent SQL Injection. 4. Monitor database query logs for unusual or repeated patterns indicative of blind SQL Injection attempts. 5. Regularly audit and update WordPress plugins and core software to the latest versions once patches become available. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection payloads targeting the vulnerable endpoints. 7. Educate administrators on the risks of privilege misuse and the importance of secure credential management. 8. If patching is not immediately possible, temporarily disable or restrict access to the vulnerable API endpoints to reduce attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-20T20:05:01.189Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69903384c9e1ff5ad8746a1b
Added to database: 2/14/2026, 8:34:12 AM
Last enriched: 2/14/2026, 8:49:02 AM
Last updated: 2/15/2026, 3:41:00 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1490: CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action in cleantalk Spam protection, Honeypot, Anti-Spam by CleanTalk
CriticalCVE-2026-23766
LowMalicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
MediumGoogle Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
MediumOver 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.