CVE-2026-1714: CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') in devitemsllc ShopLentor – All-in-One WooCommerce Growth & Store Enhancement Plugin
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient with full control over the subject line, message content, and sender address (via CRLF injection in the 'wlemail' parameter), effectively turning the website into a full email relay for spam or phishing campaigns.
AI Analysis
Technical Summary
CVE-2026-1714 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the ShopLentor – All-in-One WooCommerce Growth & Store Enhancement Plugin for WordPress. The vulnerability arises from insufficient validation of the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. Specifically, the 'wlemail' parameter is vulnerable to CRLF injection, which allows an attacker to manipulate email headers by injecting carriage return and line feed characters. This manipulation enables the attacker to control the email's sender address, subject line, and message body. Because the endpoint is accessible without authentication and requires no user interaction, an unauthenticated attacker can exploit this flaw to use the compromised website as an open email relay. This can facilitate large-scale spam or phishing campaigns originating from legitimate domains, severely impacting the website's reputation and deliverability. The vulnerability affects all versions up to and including 3.3.2 of the plugin. The CVSS v3.1 score of 8.6 reflects the high impact on integrity and the ease of exploitation without any privileges or user interaction. Although no known exploits have been reported in the wild yet, the potential for abuse is considerable given the nature of the vulnerability and the widespread use of WooCommerce plugins in e-commerce sites.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those operating e-commerce websites using WordPress with the ShopLentor plugin. Exploitation can lead to the organization's domain being used to send spam or phishing emails, resulting in blacklisting by email providers and damage to brand reputation. This can disrupt legitimate email communications, reduce customer trust, and potentially lead to regulatory scrutiny under GDPR if customer data or communications are compromised indirectly. Additionally, the misuse of the website as an email relay can increase server load and bandwidth consumption, potentially affecting availability. The integrity of email communications is compromised, which can facilitate further phishing attacks targeting customers or partners. Organizations in sectors such as retail, finance, and services that rely heavily on WooCommerce for online sales are particularly vulnerable. The cross-border nature of email abuse means that the impact can extend beyond the immediate victim to affect partners and customers across Europe.
Mitigation Recommendations
Immediate mitigation steps include updating the ShopLentor plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the 'woolentor_suggest_price_action' AJAX endpoint or the entire ShopLentor plugin if feasible. Implementing strict input validation and sanitization on all email-related parameters, especially 'wlemail', to prevent CRLF injection is critical. Web application firewalls (WAFs) should be configured to detect and block suspicious requests containing CRLF sequences or unusual email header manipulations. Monitoring outgoing email traffic for unusual patterns or spikes can help detect exploitation attempts early. Organizations should also review email server configurations to prevent unauthorized relay and ensure SPF, DKIM, and DMARC records are correctly set to reduce the impact of spoofed emails. Regular security audits and plugin vulnerability assessments should be conducted to identify and remediate similar issues proactively. Finally, educating website administrators about the risks of outdated plugins and the importance of timely updates is essential.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1714: CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') in devitemsllc ShopLentor – All-in-One WooCommerce Growth & Store Enhancement Plugin
Description
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient with full control over the subject line, message content, and sender address (via CRLF injection in the 'wlemail' parameter), effectively turning the website into a full email relay for spam or phishing campaigns.
AI-Powered Analysis
Technical Analysis
CVE-2026-1714 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the ShopLentor – All-in-One WooCommerce Growth & Store Enhancement Plugin for WordPress. The vulnerability arises from insufficient validation of the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. Specifically, the 'wlemail' parameter is vulnerable to CRLF injection, which allows an attacker to manipulate email headers by injecting carriage return and line feed characters. This manipulation enables the attacker to control the email's sender address, subject line, and message body. Because the endpoint is accessible without authentication and requires no user interaction, an unauthenticated attacker can exploit this flaw to use the compromised website as an open email relay. This can facilitate large-scale spam or phishing campaigns originating from legitimate domains, severely impacting the website's reputation and deliverability. The vulnerability affects all versions up to and including 3.3.2 of the plugin. The CVSS v3.1 score of 8.6 reflects the high impact on integrity and the ease of exploitation without any privileges or user interaction. Although no known exploits have been reported in the wild yet, the potential for abuse is considerable given the nature of the vulnerability and the widespread use of WooCommerce plugins in e-commerce sites.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those operating e-commerce websites using WordPress with the ShopLentor plugin. Exploitation can lead to the organization's domain being used to send spam or phishing emails, resulting in blacklisting by email providers and damage to brand reputation. This can disrupt legitimate email communications, reduce customer trust, and potentially lead to regulatory scrutiny under GDPR if customer data or communications are compromised indirectly. Additionally, the misuse of the website as an email relay can increase server load and bandwidth consumption, potentially affecting availability. The integrity of email communications is compromised, which can facilitate further phishing attacks targeting customers or partners. Organizations in sectors such as retail, finance, and services that rely heavily on WooCommerce for online sales are particularly vulnerable. The cross-border nature of email abuse means that the impact can extend beyond the immediate victim to affect partners and customers across Europe.
Mitigation Recommendations
Immediate mitigation steps include updating the ShopLentor plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the 'woolentor_suggest_price_action' AJAX endpoint or the entire ShopLentor plugin if feasible. Implementing strict input validation and sanitization on all email-related parameters, especially 'wlemail', to prevent CRLF injection is critical. Web application firewalls (WAFs) should be configured to detect and block suspicious requests containing CRLF sequences or unusual email header manipulations. Monitoring outgoing email traffic for unusual patterns or spikes can help detect exploitation attempts early. Organizations should also review email server configurations to prevent unauthorized relay and ensure SPF, DKIM, and DMARC records are correctly set to reduce the impact of spoofed emails. Regular security audits and plugin vulnerability assessments should be conducted to identify and remediate similar issues proactively. Finally, educating website administrators about the risks of outdated plugins and the importance of timely updates is essential.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-30T18:56:14.509Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995477080d747be203eb7fd
Added to database: 2/18/2026, 5:00:32 AM
Last enriched: 2/18/2026, 5:15:18 AM
Last updated: 2/21/2026, 12:20:55 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.