CVE-2026-1447: CWE-352 Cross-Site Request Forgery (CSRF) in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to missing sanitization and escaping this can lead to stored Cross-Site Scripting.
AI Analysis
Technical Summary
The Mail Mint plugin for WordPress, used for newsletters, email marketing, automation, WooCommerce emails, and post notifications, contains a CSRF vulnerability identified as CVE-2026-1447. This vulnerability exists in all versions up to and including 1.19.2 due to the absence of nonce validation in the create_or_update_note function. Nonce validation is a critical security measure in WordPress to prevent unauthorized actions by verifying the legitimacy of requests. Without this protection, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), allow the attacker to create or update contact notes arbitrarily. Furthermore, the plugin fails to properly sanitize and escape input data, which can lead to stored Cross-Site Scripting (XSS) attacks. Stored XSS can enable attackers to execute arbitrary JavaScript in the context of the administrator’s browser, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site. The vulnerability requires no authentication by the attacker but does require user interaction from an administrator, making exploitation somewhat dependent on social engineering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin’s role in managing sensitive marketing and customer data.
Potential Impact
This vulnerability can lead to unauthorized modification of contact notes within the Mail Mint plugin, potentially corrupting or manipulating customer data critical for marketing and communication. The stored XSS risk further elevates the threat by enabling persistent malicious scripts that can compromise administrator sessions, steal credentials, or pivot to deeper system compromise. Organizations relying on this plugin may face data integrity issues, reputational damage, and increased risk of broader WordPress site compromise. Since the attack requires administrator interaction, social engineering campaigns could be used to facilitate exploitation. The impact is particularly concerning for e-commerce sites using WooCommerce integration, where customer trust and data protection are paramount. Although availability is not affected, the confidentiality and integrity of sensitive marketing and customer information are at risk, which could lead to regulatory compliance issues and financial losses.
Mitigation Recommendations
Administrators should immediately update the Mail Mint plugin to a version that includes nonce validation and proper input sanitization once available. Until a patch is released, applying Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the create_or_update_note function can reduce risk. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of stored XSS by restricting script execution. Educate administrators about the risks of clicking unknown or suspicious links to reduce social engineering success. Regularly audit and monitor logs for unusual activity related to contact note modifications. Consider isolating or restricting administrative access to trusted networks and devices to limit exposure. Finally, review and harden WordPress security configurations, including limiting plugin permissions and ensuring all other plugins and the core WordPress installation are up to date.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2026-1447: CWE-352 Cross-Site Request Forgery (CSRF) in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
Description
The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to missing sanitization and escaping this can lead to stored Cross-Site Scripting.
AI-Powered Analysis
Technical Analysis
The Mail Mint plugin for WordPress, used for newsletters, email marketing, automation, WooCommerce emails, and post notifications, contains a CSRF vulnerability identified as CVE-2026-1447. This vulnerability exists in all versions up to and including 1.19.2 due to the absence of nonce validation in the create_or_update_note function. Nonce validation is a critical security measure in WordPress to prevent unauthorized actions by verifying the legitimacy of requests. Without this protection, attackers can craft malicious requests that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), allow the attacker to create or update contact notes arbitrarily. Furthermore, the plugin fails to properly sanitize and escape input data, which can lead to stored Cross-Site Scripting (XSS) attacks. Stored XSS can enable attackers to execute arbitrary JavaScript in the context of the administrator’s browser, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site. The vulnerability requires no authentication by the attacker but does require user interaction from an administrator, making exploitation somewhat dependent on social engineering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction required, and limited impact on confidentiality and integrity but no impact on availability. No patches or exploits are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin’s role in managing sensitive marketing and customer data.
Potential Impact
This vulnerability can lead to unauthorized modification of contact notes within the Mail Mint plugin, potentially corrupting or manipulating customer data critical for marketing and communication. The stored XSS risk further elevates the threat by enabling persistent malicious scripts that can compromise administrator sessions, steal credentials, or pivot to deeper system compromise. Organizations relying on this plugin may face data integrity issues, reputational damage, and increased risk of broader WordPress site compromise. Since the attack requires administrator interaction, social engineering campaigns could be used to facilitate exploitation. The impact is particularly concerning for e-commerce sites using WooCommerce integration, where customer trust and data protection are paramount. Although availability is not affected, the confidentiality and integrity of sensitive marketing and customer information are at risk, which could lead to regulatory compliance issues and financial losses.
Mitigation Recommendations
Administrators should immediately update the Mail Mint plugin to a version that includes nonce validation and proper input sanitization once available. Until a patch is released, applying Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting the create_or_update_note function can reduce risk. Implementing strict Content Security Policy (CSP) headers can help mitigate the impact of stored XSS by restricting script execution. Educate administrators about the risks of clicking unknown or suspicious links to reduce social engineering success. Regularly audit and monitor logs for unusual activity related to contact note modifications. Consider isolating or restricting administrative access to trusted networks and devices to limit exposure. Finally, review and harden WordPress security configurations, including limiting plugin permissions and ensuring all other plugins and the core WordPress installation are up to date.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-26T17:00:55.043Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69819975f9fa50a62faa53cc
Added to database: 2/3/2026, 6:45:09 AM
Last enriched: 2/26/2026, 7:10:25 PM
Last updated: 3/19/2026, 7:27:08 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.