CVE-2026-1937: CWE-862 Missing Authorization in yaycommerce YayMail – WooCommerce Email Customizer
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI Analysis
Technical Summary
CVE-2026-1937 is a critical authorization bypass vulnerability in the YayMail – WooCommerce Email Customizer plugin for WordPress, identified as CWE-862 (Missing Authorization). The vulnerability exists in the yaymail_import_state AJAX action, which lacks proper capability checks, allowing authenticated users with Shop Manager-level privileges or higher to perform unauthorized modifications to WordPress site options. Specifically, attackers can update arbitrary options, including changing the default user role for new registrations to administrator and enabling user registration. This effectively allows attackers to create new administrative accounts, leading to complete site compromise. The vulnerability affects all versions up to and including 4.3.2 of the plugin. The CVSS 3.1 score of 9.8 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required beyond Shop Manager, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the flaw's simplicity and impact make it a significant threat. The vulnerability was published on February 18, 2026, and no official patches have been linked yet. Organizations using WooCommerce with this plugin should consider immediate mitigations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a severe risk as it enables privilege escalation from Shop Manager to administrator, potentially leading to full site compromise. This can result in unauthorized access to sensitive customer data, manipulation of e-commerce transactions, defacement, or complete loss of service availability. Given WooCommerce's popularity in Europe for online retail, many small to medium enterprises could be affected, especially those with multiple Shop Manager users or less stringent role management. The ability to enable user registration and assign administrative roles can facilitate persistent attacker presence and lateral movement within the WordPress environment. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and financial losses from disrupted operations or fraud. The lack of public exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately audit and restrict Shop Manager permissions to the minimum necessary, ensuring only trusted users have this role. 2. Temporarily disable user registration on affected WordPress sites until patches are available. 3. Monitor for suspicious changes in WordPress options, especially default user roles and registration settings. 4. Implement Web Application Firewall (WAF) rules to detect and block unauthorized AJAX requests to yaymail_import_state endpoints. 5. Keep the YayMail plugin updated and apply any patches released by the vendor as soon as they become available. 6. Consider removing or replacing the plugin if it is not essential to reduce attack surface. 7. Conduct regular security audits and role-based access control reviews to prevent privilege escalation risks. 8. Use security plugins that can alert on changes to user roles or new administrator accounts. 9. Educate site administrators about the risks of elevated roles and the importance of strict access controls.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2026-1937: CWE-862 Missing Authorization in yaycommerce YayMail – WooCommerce Email Customizer
Description
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
AI-Powered Analysis
Technical Analysis
CVE-2026-1937 is a critical authorization bypass vulnerability in the YayMail – WooCommerce Email Customizer plugin for WordPress, identified as CWE-862 (Missing Authorization). The vulnerability exists in the yaymail_import_state AJAX action, which lacks proper capability checks, allowing authenticated users with Shop Manager-level privileges or higher to perform unauthorized modifications to WordPress site options. Specifically, attackers can update arbitrary options, including changing the default user role for new registrations to administrator and enabling user registration. This effectively allows attackers to create new administrative accounts, leading to complete site compromise. The vulnerability affects all versions up to and including 4.3.2 of the plugin. The CVSS 3.1 score of 9.8 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, no privileges required beyond Shop Manager, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the flaw's simplicity and impact make it a significant threat. The vulnerability was published on February 18, 2026, and no official patches have been linked yet. Organizations using WooCommerce with this plugin should consider immediate mitigations to prevent exploitation.
Potential Impact
For European organizations, this vulnerability poses a severe risk as it enables privilege escalation from Shop Manager to administrator, potentially leading to full site compromise. This can result in unauthorized access to sensitive customer data, manipulation of e-commerce transactions, defacement, or complete loss of service availability. Given WooCommerce's popularity in Europe for online retail, many small to medium enterprises could be affected, especially those with multiple Shop Manager users or less stringent role management. The ability to enable user registration and assign administrative roles can facilitate persistent attacker presence and lateral movement within the WordPress environment. The impact extends to reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and financial losses from disrupted operations or fraud. The lack of public exploits currently provides a window for proactive defense, but the critical severity demands urgent attention.
Mitigation Recommendations
1. Immediately audit and restrict Shop Manager permissions to the minimum necessary, ensuring only trusted users have this role. 2. Temporarily disable user registration on affected WordPress sites until patches are available. 3. Monitor for suspicious changes in WordPress options, especially default user roles and registration settings. 4. Implement Web Application Firewall (WAF) rules to detect and block unauthorized AJAX requests to yaymail_import_state endpoints. 5. Keep the YayMail plugin updated and apply any patches released by the vendor as soon as they become available. 6. Consider removing or replacing the plugin if it is not essential to reduce attack surface. 7. Conduct regular security audits and role-based access control reviews to prevent privilege escalation risks. 8. Use security plugins that can alert on changes to user roles or new administrator accounts. 9. Educate site administrators about the risks of elevated roles and the importance of strict access controls.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-04T21:18:36.457Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995672780d747be204d293f
Added to database: 2/18/2026, 7:15:51 AM
Last enriched: 2/18/2026, 7:30:21 AM
Last updated: 2/19/2026, 8:58:34 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2817: CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory in VMware Spring Data Geode
MediumCVE-2026-2409: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Delinea Cloud Suite
CriticalCVE-2026-2243: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2026-23620: CWE-203 Observable Discrepancy in GFI Software MailEssentials AI
MediumCVE-2026-23619: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in GFI Software MailEssentials AI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.