CVE-2026-3614
Received Received - Intake
Privilege Escalation in AcyMailing Plugin via Missing Capability Check

Publication date: 2026-04-16

Last updated on: 2026-04-16

Assigner: Wordfence

Description
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11.0 up to, and including, 10.8.1 due to a missing capability check on the `wp_ajax_acymailing_router` AJAX handler. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access admin-only controllers (including configuration management), enable the autologin feature, create a malicious newsletter subscriber with an injected `cms_id` pointing to any WordPress user, and then use the autologin URL to authenticate as that user, including administrators.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-16
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
acyba acymailing From 9.11.0 (inc) to 10.8.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can lead to a serious security breach by allowing attackers with low-level access to gain administrator privileges.

Once escalated, attackers can control the WordPress site, modify configurations, and potentially compromise sensitive data.

The CVSS score of 8.8 indicates a high severity impact on confidentiality, integrity, and availability.


Can you explain this vulnerability to me?

The AcyMailing plugin for WordPress has a vulnerability in versions 9.11.0 through 10.8.1 caused by a missing capability check on the wp_ajax_acymailing_router AJAX handler.

This flaw allows authenticated users with Subscriber-level access or higher to escalate their privileges by accessing admin-only controllers, including configuration management.

Attackers can enable the autologin feature, create a malicious newsletter subscriber with an injected cms_id linked to any WordPress user, and then use the autologin URL to authenticate as that user, including administrators.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart