CVE-2026-39713
Received Received - Intake
Missing Authorization in Mailercloud Webforms Enables Unauthorized Access

Publication date: 2026-04-08

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Missing Authorization vulnerability in mailercloud Mailercloud – Integrate webforms and synchronize website contacts mailercloud-integrate-webforms-synchronize-contacts allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Mailercloud – Integrate webforms and synchronize website contacts: from n/a through <= 1.0.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mailercloud mailercloud_integrate_webforms_synchronize_contacts to 1.0.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a Missing Authorization (Broken Access Control) issue in the Mailercloud WordPress plugin, allowing unauthenticated users to perform privileged actions. Detection typically involves checking the plugin version and testing access control enforcement on plugin functions.

To detect if your system is vulnerable, first verify if the Mailercloud plugin version is 1.0.7 or earlier, as these versions are affected.

You can check the plugin version on your WordPress site by running the following command on the server hosting WordPress:

  • grep -i 'Version' wp-content/plugins/mailercloud-integrate-webforms-synchronize-contacts/readme.txt

Alternatively, you can check the plugin version via WP-CLI:

  • wp plugin list | grep mailercloud

To test for the vulnerability, you can attempt to access or invoke plugin functions that require authorization without being authenticated. This may involve sending crafted HTTP requests to endpoints handled by the plugin and observing if unauthorized actions are permitted.

Since no official patch or detailed exploit commands are provided, manual testing or using security scanners that detect broken access control in WordPress plugins may help identify the issue.


Can you explain this vulnerability to me?

CVE-2026-39713 is a Broken Access Control vulnerability in the WordPress plugin "Mailercloud – Integrate webforms and synchronize website contacts," affecting versions up to and including 1.0.7.

The vulnerability arises from missing authorization, authentication, or nonce token checks in certain plugin functions, which allows unauthenticated users to perform actions that should be restricted to higher-privileged users.

It is classified under the OWASP Top 10 category A1: Broken Access Control and has a CVSS severity score of 5.3, indicating a low severity impact.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated users to perform privileged actions within the affected plugin, potentially leading to unauthorized access or manipulation of website contacts synchronized through the plugin.

Although such vulnerabilities can be exploited in mass campaigns targeting many websites, this specific flaw is considered unlikely to be exploited with significant impact.

No official patch is currently available, so immediate mitigation involves updating the plugin or seeking assistance from hosting providers or web developers.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the affected Mailercloud plugin to a fixed version.

If updating the plugin is not possible, users are advised to seek assistance from their hosting provider or web developer.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a Broken Access Control issue that allows unauthenticated users to perform actions reserved for higher-privileged users. Such unauthorized access could potentially lead to unauthorized data exposure or modification.

While the CVE description and resources do not explicitly mention compliance with standards like GDPR or HIPAA, broken access control vulnerabilities generally pose risks to data confidentiality and integrity, which are critical aspects of these regulations.

Therefore, if exploited, this vulnerability could negatively impact compliance with regulations that require strict access controls and protection of personal or sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart