Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1447: CWE-352 Cross-Site Request Forgery (CSRF) in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

0
Medium
VulnerabilityCVE-2026-1447cvecve-2026-1447cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 06:38:05 UTC)
Source: CVE Database V5
Vendor/Project: getwpfunnels
Product: Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

Description

The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to missing sanitization and escaping this can lead to stored Cross-Site Scripting.

AI-Powered Analysis

AILast updated: 02/26/2026, 19:10:25 UTC

Technical Analysis

The Mail Mint plugin for WordPress, used for newsletters, email marketing, automation, WooCommerce emails, and post notifications, contains a CSRF vulnerability identified as CVE-2026-1447. This vulnerability exists in all versions up to and including 1.19.2 due to the absence of nonce validation in the create_or_update_note function. Nonce validation is a critical security measure in WordPress to prevent unauthorized actions by verifying the legitimacy of requests. Without this protection, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), allow the attacker to create or update contact notes arbitrarily. Furthermore, the plugin fails to properly sanitize and escape input data, which can lead to stored Cross-Site Scripting (XSS) attacks. Stored XSS can enable attackers to execute arbitrary JavaScript in the context of the administrator’s browser, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site. The vulnerability requires no authentication by the attacker but does require user interaction from an administrator, making exploitation somewhat dependent on social engineering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin’s role in managing sensitive marketing and customer data.

Potential Impact

This vulnerability can lead to unauthorized modification of contact notes within the Mail Mint plugin, potentially corrupting or manipulating customer data critical for marketing and communication. The stored XSS risk further elevates the threat by enabling persistent malicious scripts that can compromise administrator sessions, steal credentials, or pivot to deeper system compromise. Organizations relying on this plugin may face data integrity issues, reputational damage, and increased risk of broader WordPress site compromise. Since the attack requires administrator interaction, social engineering campaigns could be used to facilitate exploitation. The impact is particularly concerning for e-commerce sites using WooCommerce integration, where customer trust and data protection are paramount. Although availability is not affected, the confidentiality and integrity of sensitive marketing and customer information are at risk, which could lead to regulatory compliance issues and financial losses.

Mitigation Recommendations

Administrators should immediately update the Mail Mint plugin to a version that includes nonce validation and proper input sanitization once available. Until a patch is released, applying Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the create_or_update_note function can reduce risk. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of stored XSS by restricting script execution. Educate administrators about the risks of clicking unknown or suspicious links to reduce social engineering success. Regularly audit and monitor logs for unusual activity related to contact note modifications. Consider isolating or restricting administrative access to trusted networks and devices to limit exposure. Finally, review and harden WordPress security configurations, including limiting plugin permissions and ensuring all other plugins and the core WordPress installation are up to date.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-26T17:00:55.043Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69819975f9fa50a62faa53cc

Added to database: 2/3/2026, 6:45:09 AM

Last enriched: 2/26/2026, 7:10:25 PM

Last updated: 3/19/2026, 7:27:08 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses