CVE-2026-1831
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with Shop Manager-level access or higher to install and activate the YaySMTP plugin on a WordPress site without proper authorization. This could lead to unauthorized changes in email settings and potential exploitation of the site’s email functionality.
Technical Description
The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago