CVE-2026-1943
Received Received - Intake
Stored XSS in YayMail WooCommerce Plugin Affects Multi-Site

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yaymail woocommerce_email_customizer to 4.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting (XSS) in all versions up to and including 4.3.2. This vulnerability arises because the plugin does not properly sanitize input or escape output in its settings. Authenticated users with Shop Manager-level permissions or higher can inject malicious web scripts into pages. These scripts execute whenever a user accesses the injected page. The vulnerability specifically affects multi-site WordPress installations and installations where the unfiltered_html capability has been disabled.


How can this vulnerability impact me? :

This vulnerability allows attackers with certain authenticated privileges to inject arbitrary scripts into the website. These scripts can execute in the context of users visiting the affected pages, potentially leading to unauthorized actions such as stealing session cookies, performing actions on behalf of users, or defacing content. Because the vulnerability is a Stored Cross-Site Scripting issue, the malicious code persists on the site and affects all users who access the injected content. The impact is limited to multi-site setups or where unfiltered_html is disabled, but within those environments, it can compromise user trust and site security.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves Stored Cross-Site Scripting (XSS) in the YayMail – WooCommerce Email Customizer plugin for WordPress, affecting versions up to 4.3.2. Detection involves identifying injected malicious scripts in the plugin's email template settings, especially in multi-site installations or where unfiltered_html is disabled."}, {'type': 'paragraph', 'content': 'Since the plugin manages email templates via REST API endpoints, you can inspect templates for suspicious script tags or unusual content by querying these endpoints.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect potential exploitation or presence of injected scripts include:'}, {'type': 'list_item', 'content': 'Use WP-CLI or curl to fetch templates via REST API endpoints, for example, GET requests to `/wp-json/yaymail/v1/templates` or `/wp-json/yaymail/v1/templates/{template_id}` to review template content.'}, {'type': 'list_item', 'content': "Search the WordPress database for suspicious script tags in YayMail template-related tables, e.g., using SQL commands like: `SELECT * FROM wp_yaymail_templates WHERE template_elements LIKE '%<script>%'`."}, {'type': 'list_item', 'content': 'Check for unusual or unauthorized changes in email templates by comparing current templates against known good backups.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this Stored Cross-Site Scripting vulnerability in the YayMail plugin, immediate steps include:

  • Upgrade the YayMail plugin to a version later than 4.3.2 where the vulnerability is fixed.
  • Restrict Shop Manager-level permissions and above to trusted users only, as the vulnerability requires authenticated users with these permissions.
  • If upgrading immediately is not possible, consider disabling multi-site installations or enabling unfiltered_html temporarily to reduce risk, as the vulnerability only affects multi-site setups or installations where unfiltered_html is disabled.
  • Audit and sanitize existing email templates to remove any injected scripts or suspicious content.
  • Monitor access logs and REST API usage for suspicious activity related to YayMail template endpoints.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart