CVE-2026-1831
Received Received - Intake
Unauthorized Plugin Installation in YayMail WooCommerce Plugin

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yaymail yaymail to 4.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The YayMail - WooCommerce Email Customizer plugin for WordPress has a vulnerability that allows unauthorized plugin installation and activation. This happens because the plugin does not properly check user capabilities on certain AJAX and REST API endpoints, specifically the 'yaymail_install_yaysmtp' AJAX action and the '/yaymail/v1/addons/activate' REST endpoint.

As a result, any authenticated user with Shop Manager-level access or higher can exploit this flaw to install and activate the YaySMTP plugin without proper authorization.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing users with Shop Manager-level access or above to install and activate plugins without proper permission checks. This could lead to unauthorized changes to your WordPress environment.

Specifically, an attacker could install and activate the YaySMTP plugin, potentially altering email sending behavior or introducing additional attack vectors through the newly installed plugin.

Although the CVSS base score is relatively low (2.7), indicating limited impact on confidentiality and availability, the integrity of your site could be compromised by unauthorized plugin activation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves unauthorized installation and activation of the YaySMTP plugin via the 'yaymail_install_yaysmtp' AJAX action and the '/yaymail/v1/addons/activate' REST endpoint. Detection can focus on monitoring for suspicious AJAX requests or REST API calls related to these endpoints."}, {'type': 'list_item', 'content': "Check web server or application logs for POST requests to the AJAX action 'yaymail_install_yaysmtp' or REST endpoint '/wp-json/yaymail/v1/addons/activate'."}, {'type': 'list_item', 'content': 'Look for unexpected plugin installation or activation events in WordPress logs or audit trails.'}, {'type': 'list_item', 'content': "Use commands like `grep 'yaymail_install_yaysmtp' /path/to/access.log` or `grep '/wp-json/yaymail/v1/addons/activate' /path/to/access.log` to find relevant HTTP requests."}, {'type': 'list_item', 'content': 'Monitor WordPress plugin directories for new files or changes related to the YaySMTP plugin.'}] [1, 3, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable AJAX and REST endpoints and limiting user capabilities.

  • Restrict or disable the 'yaymail_install_yaysmtp' AJAX action and the '/yaymail/v1/addons/activate' REST endpoint if possible, for example by blocking these URLs at the web server or firewall level.
  • Limit Shop Manager-level and higher user permissions to trusted users only, as the vulnerability requires authenticated users with such access.
  • Update the YayMail plugin to a version later than 4.3.2 where this vulnerability is fixed.
  • Monitor plugin installations and activations closely to detect any unauthorized activity.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart