Vulnerability Description
The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Ajax.php#L183
- https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Controllers/Ad
- https://plugins.trac.wordpress.org/browser/yaymail/trunk/src/Ajax.php#L183
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a568162a-5a2d-47ab-9df
FAQ
What is CVE-2026-1831?
CVE-2026-1831 is a vulnerability with a CVSS score of 2.7 (LOW). The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX ...
How severe is CVE-2026-1831?
CVE-2026-1831 has been rated LOW with a CVSS base score of 2.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1831?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.