EmailKit – Email Customizer for WooCommerce & WP Vulnerability (Med…

EmailKit – Email Customizer for WooCommerce & WP Vulnerability (Med…

by | Feb 17, 2026 | Plugins

Attack Vectors

EmailKit – Email Customizer for WooCommerce & WP (slug: emailkit) is affected by CVE-2026-1925, a Medium severity vulnerability (CVSS 4.3, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) in versions 1.6.2 and below.

The primary attack path is through a standard user login with low privileges: an authenticated attacker with Subscriber-level access or higher can take advantage of this issue over the network without user interaction. This can occur when a site allows user registration, when accounts are created for customers, partners, or contractors, or when an attacker compromises any low-privilege account.

Because the weakness enables changing post titles across content types (posts, pages, and custom post types), the risk applies broadly to websites using WordPress as a marketing, ecommerce, or content platform.

Security Weakness

This issue is caused by a missing authorization (capability) check in the plugin’s update_template_data function. In practical terms, the site does not reliably confirm that the logged-in user is allowed to perform the action before it is carried out.

As a result, authenticated users who should not be able to edit site content can still modify the title of any post, page, or custom post type. The vulnerability is categorized as unauthorized data modification with an integrity impact (not confidentiality or availability), consistent with its CVSS scoring.

Remediation: Update EmailKit – Email Customizer for WooCommerce & WP to version 1.6.3 or a newer patched version.

Technical or Business Impacts

Brand and revenue risk: Post titles are highly visible in page headers, menus, internal search, and promotional landing pages. Unauthorized title changes can mislead customers, reduce conversion rates, and damage trust—especially during campaigns or product launches.

SEO and discoverability impact: Titles influence click-through rates from search results and affect how content is shared on social and email. Even small unauthorized changes can undermine SEO performance and disrupt marketing attribution and reporting.

Operational and compliance impact: Changing titles on regulated or policy-related pages (e.g., terms, disclosures, compliance statements) can create audit and governance headaches, increase review overhead, and introduce reputational risk if customers perceive content as inconsistent or unreliable.

Risk amplification: Although this is a Medium severity issue and does not indicate data theft on its own, it becomes more serious in environments with broad user access (customers, community accounts, multi-author sites) or where low-privilege accounts are more likely to be compromised.

Similar Attacks

Missing authorization checks are a common theme in WordPress plugin vulnerabilities and are frequently used to deface content, manipulate marketing pages, or disrupt site operations. Public examples include:

Wordfence: Social Warfare vulnerability (2019)

Wordfence: WordPress REST API content injection vulnerability (2017)

Wordfence: File Manager plugin vulnerabilities (2020)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers