YayMail – WooCommerce Email Customizer Vulnerability (Critical) – C…

YayMail – WooCommerce Email Customizer Vulnerability (Critical) – C…

by | Feb 17, 2026 | Plugins

Attack Vectors

Marketing and operations teams often grant “Shop Manager” access to handle orders, refunds, and customer communications. In YayMail – WooCommerce Email Customizer (plugin slug: yaymail) versions up to 4.3.2, that level of access (and above) can be abused because a critical authorization check is missing on the yaymail_import_state AJAX action.

This vulnerability (CVE-2026-1937, Critical severity, CVSS 9.8) allows an authenticated attacker with Shop Manager privileges to update arbitrary WordPress options. In practical terms, it can be used to change security-relevant settings such as enabling public user registration and setting the default registration role to Administrator—creating a path to full site takeover.

Security Weakness

The core weakness is “missing authorization” (a missing capability check). The plugin exposes an administrative-style action that changes site configuration, but it does not sufficiently verify that the user invoking it has the appropriate permissions to perform that change.

Because the affected functionality can update arbitrary WordPress options, it crosses from “a plugin issue” into “a platform control issue.” That significantly increases risk: business-critical settings can be altered without going through normal administrative approvals or safeguards.

Technical or Business Impacts

High likelihood of full compromise: If exploited, attackers can escalate privileges to gain administrative access. With admin control, they can modify site content, add users, install other plugins, redirect traffic, or disable security tooling—turning a marketing website or eCommerce store into an attacker-controlled asset.

Revenue and brand damage: A compromised WooCommerce store can lead to fraudulent content changes, checkout disruption, SEO spam, or customer trust erosion. Even short outages during campaigns can have outsized financial impact, especially for high-traffic promotions and paid media spend.

Compliance and incident response costs: Admin-level compromise can trigger legal and regulatory obligations depending on what data is accessed or altered. It can also require emergency communications, forensics, password resets, and potentially customer notifications—costly activities that distract leadership and teams from core business operations.

Recommended action: Update YayMail – WooCommerce Email Customizer to version 4.3.3 or newer (patched). After updating, review WordPress user accounts and roles for unexpected administrator users, and confirm registration settings (e.g., whether public registration is enabled and what the default role is) align with policy.

Reference: CVE-2026-1937 and the vendor analysis at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers