CVE-2026-1831

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with Shop Manager-level access or higher to install and activate the YaySMTP plugin on a WordPress site without proper authorization. This could lead to unauthorized changes in email settings and potential exploitation of the site’s email functionality.

Technical Description

The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$374($100-$500)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 18, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago