Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1925: CWE-862 Missing Authorization in roxnor EmailKit – Email Customizer for WooCommerce & WP

0
Medium
VulnerabilityCVE-2026-1925cvecve-2026-1925cwe-862
Published: Wed Feb 18 2026 (02/18/2026, 04:35:46 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: EmailKit – Email Customizer for WooCommerce & WP

Description

The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the 'update_template_data' function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title of any post on the site, including posts, pages, and custom post types.

AI-Powered Analysis

AILast updated: 02/18/2026, 05:15:30 UTC

Technical Analysis

CVE-2026-1925 identifies a missing authorization vulnerability (CWE-862) in the EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress, specifically in the 'update_template_data' function. This function lacks proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to modify the title of any post on the site, including standard posts, pages, and custom post types. The vulnerability affects all plugin versions up to and including 1.6.2. The attack vector is remote network access requiring authentication but no user interaction beyond login. The vulnerability impacts data integrity by enabling unauthorized modification of content titles, which could be leveraged for defacement, misinformation, or social engineering attacks. The CVSS v3.1 score is 4.3 (medium), reflecting low impact on confidentiality and availability but moderate impact on integrity. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The plugin is commonly used in WooCommerce-powered WordPress sites, which are prevalent in e-commerce environments. The lack of authorization checks indicates a design flaw in access control implementation within the plugin, emphasizing the need for strict capability verification in WordPress plugins handling content modifications.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of website content. Unauthorized modification of post titles can lead to misinformation, brand damage, and loss of customer trust, especially for e-commerce sites relying on WooCommerce and EmailKit for transactional or marketing emails. While it does not directly expose sensitive data or disrupt service availability, altered content can facilitate phishing or social engineering attacks by misleading users. Organizations with multi-user WordPress environments where lower-privileged users have Subscriber or higher roles are particularly vulnerable. The reputational impact can be significant for businesses in regulated sectors such as finance, healthcare, and retail, where website integrity is critical. Additionally, attackers could use this vulnerability as a foothold for further attacks if combined with other weaknesses. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly known.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit user roles and permissions within their WordPress environments, ensuring that Subscriber-level users are limited and monitored. Restrict plugin access to trusted administrators and editors only. Implement strict role-based access controls and consider disabling or removing the EmailKit plugin if it is not essential. Monitor website content for unauthorized changes, particularly post titles, using file integrity monitoring or content change detection tools. Apply security plugins that can enforce additional authorization checks or alert on suspicious activity. Stay informed about updates from the plugin vendor and apply patches promptly once released. As a temporary workaround, organizations with development resources could implement custom capability checks or filters to restrict access to the 'update_template_data' function. Conduct regular security training for administrators to recognize and respond to potential misuse of user accounts. Finally, maintain comprehensive backups to restore content in case of unauthorized modifications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-04T19:32:44.061Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995477080d747be203eb807

Added to database: 2/18/2026, 5:00:32 AM

Last enriched: 2/18/2026, 5:15:30 AM

Last updated: 2/21/2026, 12:15:46 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats