WP Mail Logging Vulnerability (High) – CVE-2026-2471

WP Mail Logging Vulnerability (High) – CVE-2026-2471

by | Feb 27, 2026 | Plugins

Attack Vectors

WP Mail Logging (slug: wp-mail-logging) is affected by a High-severity vulnerability (CVE-2026-2471, CVSS 7.5) that can be triggered through everyday website interactions. An unauthenticated attacker may submit a specially crafted payload via any public-facing form that sends an email (for example, common contact or lead-capture forms).

The risk becomes active when the email is recorded by WP Mail Logging and then an administrator later views the logged message in the WordPress dashboard. This aligns with the vulnerability’s “user interaction required” condition: the attacker’s submission can sit in the log until someone on your team opens it.

Security Weakness

In WP Mail Logging versions up to and including 1.15.0, the plugin’s model layer (BaseModel) calls maybe_unserialize() on properties pulled from the database without validation. This creates a PHP Object Injection condition through deserialization of untrusted input coming from the email log message field.

Because the payload can be delivered through normal inbound messages (such as a contact form submission) and stored in the database, the vulnerability can be exploited using a double-serialized payload that is later processed when the log entry is viewed.

Technical or Business Impacts

PHP Object Injection vulnerabilities can have serious outcomes depending on what other plugins, themes, or components are installed (often referred to as “gadget chains”). In the worst case, successful exploitation can enable outcomes such as site compromise, data exposure, content tampering, or service disruption. For business leaders, this translates into risks like lost revenue from downtime, brand damage, lead and customer data risk, and potential compliance and reporting obligations if sensitive information is accessed.

This issue is tracked as CVE-2026-2471 and is rated High (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). While exploitation is not “one-click” (higher complexity and requires an admin to view the logged email), the potential impact is significant once triggered.

Remediation: Update WP Mail Logging to version 1.16 or a newer patched release. As a practical risk-reduction step, review which public forms generate email, limit unnecessary email logging, and ensure only trusted staff can access mail logs.

Similar attacks: Deserialization and object injection weaknesses have been widely exploited in other platforms, including Joomla (CVE-2015-8562), Apache Struts (CVE-2017-9805), and Oracle WebLogic (CVE-2019-2725). These examples underscore why deserialization issues are treated as high risk in governance and compliance programs.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers