CVE-2026-1938
Received Received - Intake
Unauthorized License Key Deletion in YayMail WooCommerce Plugin

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized license key deletion due to a missing authorization check on the `/yaymail-license/v1/license/delete` REST endpoint in versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to delete the plugin's license key via the '/yaymail-license/v1/license/delete' endpoint granted they can obtain the REST API nonce.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yaymail yaymail to 4.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'The YayMail – WooCommerce Email Customizer plugin for WordPress has a vulnerability in versions up to and including 4.3.2 where the REST endpoint `/yaymail-license/v1/license/delete` lacks proper authorization checks.'}, {'type': 'paragraph', 'content': "This means that authenticated users with Shop Manager-level access or higher can delete the plugin's license key if they can obtain the REST API nonce, even though they should not have permission to do so."}, {'type': 'paragraph', 'content': 'The root cause is that the permission callback for this endpoint always returns true, allowing access without verifying user capabilities.'}] [2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability allows attackers with Shop Manager-level access or above to delete the plugin's license key without proper authorization."}, {'type': 'paragraph', 'content': 'Deleting the license key could disable plugin features that require a valid license, potentially disrupting email customization functionality in WooCommerce.'}, {'type': 'paragraph', 'content': "Since the license key controls plugin activation, unauthorized deletion might lead to loss of support, updates, or functionality, impacting the site's operation."}] [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized license key deletion via the REST API endpoint `/yaymail-license/v1/license/delete` in YayMail plugin versions up to 4.3.2. Detection can focus on monitoring HTTP POST requests to this specific REST endpoint.

To detect potential exploitation attempts on your system or network, you can monitor web server logs or use network traffic inspection tools to identify POST requests targeting the `/yaymail-license/v1/license/delete` endpoint.

  • Use command-line tools like grep to search web server access logs for suspicious POST requests: `grep 'POST /wp-json/yaymail-license/v1/license/delete' /path/to/access.log`
  • Use network packet capture tools such as tcpdump or Wireshark to filter HTTP POST requests to the vulnerable endpoint, for example: `tcpdump -i eth0 -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '/wp-json/yaymail-license/v1/license/delete'`

Additionally, monitoring WordPress REST API logs or enabling detailed logging on the web server for REST API calls can help identify unauthorized license deletion attempts.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update the YayMail plugin to version 4.3.3 or later, which includes security fixes that enforce stricter permission checks on the license management REST API endpoints.

The update changes the permission callback for the `/license/delete` endpoint to require the `manage_options` capability, restricting access to administrator-level users only, and enforces nonce verification properly.

  • Immediately update the YayMail plugin to version 4.3.3 or newer.
  • Restrict access to the WordPress REST API endpoints by limiting user roles and capabilities, ensuring only trusted administrators have permissions to manage plugins.
  • If updating immediately is not possible, consider temporarily restricting access to the `/yaymail-license/v1/license/delete` endpoint via web server rules or firewall rules to block unauthorized POST requests.

Regularly monitor your WordPress user roles and REST API usage to detect and prevent unauthorized actions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart