CVE-2026-3614
Privilege Escalation in AcyMailing Plugin via Missing Capability Check
Publication date: 2026-04-16
Last updated on: 2026-04-16
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acyba | acymailing | From 9.11.0 (inc) to 10.8.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can lead to a serious security breach by allowing attackers with low-level access to gain administrator privileges.
Once escalated, attackers can control the WordPress site, modify configurations, and potentially compromise sensitive data.
The CVSS score of 8.8 indicates a high severity impact on confidentiality, integrity, and availability.
Can you explain this vulnerability to me?
The AcyMailing plugin for WordPress has a vulnerability in versions 9.11.0 through 10.8.1 caused by a missing capability check on the wp_ajax_acymailing_router AJAX handler.
This flaw allows authenticated users with Subscriber-level access or higher to escalate their privileges by accessing admin-only controllers, including configuration management.
Attackers can enable the autologin feature, create a malicious newsletter subscriber with an injected cms_id linked to any WordPress user, and then use the autologin URL to authenticate as that user, including administrators.