CVE-2026-2025
Unauthorized Access in Mail Mint Plugin Exposes User Emails
Publication date: 2026-03-04
Last updated on: 2026-03-04
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mail_mint | mail_mint | to 1.19.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-2025 is a vulnerability in the Mail Mint WordPress plugin versions before 1.19.5. It occurs because one of the plugin's REST API endpoints, specifically `/wp-json/mrm/v1/wp/admins`, does not have proper authorization checks."}, {'type': 'paragraph', 'content': 'This lack of authorization allows unauthenticated users to call the endpoint and retrieve sensitive information, namely the email addresses of users registered on the WordPress site.'}, {'type': 'paragraph', 'content': 'The vulnerability is classified as a Sensitive Data Disclosure (CWE-200) and is considered high severity with a CVSS score of 7.5. It falls under the OWASP Top 10 category A3: Sensitive Data Exposure.'}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by exposing the email addresses of users registered on your WordPress site to unauthenticated attackers.
Such exposure of sensitive user data can lead to privacy violations, targeted phishing attacks, spam, and other malicious activities leveraging the disclosed email information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending unauthenticated requests to the vulnerable REST API endpoint of the Mail Mint WordPress plugin and checking if email addresses are returned.'}, {'type': 'paragraph', 'content': 'A common method is to use curl commands targeting the endpoint `/wp-json/mrm/v1/wp/admins` with query parameters such as `term=@`, `term=.com`, or `term=gmail`.'}, {'type': 'list_item', 'content': 'curl -s "http://example.com/wp-json/mrm/v1/wp/admins?term=@"'}, {'type': 'list_item', 'content': 'curl -s "http://example.com/wp-json/mrm/v1/wp/admins?term=.com"'}, {'type': 'list_item', 'content': 'curl -s "http://example.com/wp-json/mrm/v1/wp/admins?term=gmail"'}, {'type': 'paragraph', 'content': 'If these commands return email addresses without authentication, the vulnerability is present.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the Mail Mint WordPress plugin to version 1.19.5 or later, where the authorization issue in the REST API endpoint has been fixed.