CVE-2026-1447

5.4 MEDIUM

📋 TL;DR

The Mail Mint WordPress plugin is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to 1.19.2, allowing unauthenticated attackers to create or update contact notes by tricking administrators into clicking malicious links. This can lead to stored Cross-Site Scripting (XSS) due to missing sanitization and escaping. All WordPress sites using vulnerable Mail Mint plugin versions are affected.

💻 Affected Systems

Products:
  • Mail Mint WordPress Plugin
Versions: All versions up to and including 1.19.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Mail Mint plugin enabled. The vulnerability exists in default configurations.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts into contact notes that execute when viewed by administrators, potentially leading to site takeover, data theft, or malware distribution.

🟠

Likely Case

Attackers create or modify contact notes with malicious content that could deface the site, steal session cookies, or redirect users to malicious sites.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail, preventing unauthorized note modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick an administrator into clicking a malicious link, but the technical complexity is low once the link is clicked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.19.3 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/mail-mint/trunk/app/API/Actions/Admin/Contact/ContactProfileAction.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Mail Mint plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable Mail Mint Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate mail-mint

Implement CSRF Protection at Web Application Firewall

all

Configure WAF to block requests lacking proper nonce validation for Mail Mint endpoints.

🧯 If You Can't Patch

  • Disable Mail Mint plugin immediately to eliminate risk.
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Mail Mint version. If version is 1.19.2 or lower, system is vulnerable.

Check Version:

wp plugin get mail-mint --field=version

Verify Fix Applied:

After update, verify Mail Mint plugin version is 1.19.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-json/mail-mint/v1/contact/profile endpoint without proper referrer or nonce.
  • Multiple failed nonce validation attempts in WordPress debug logs.

Network Indicators:

  • HTTP requests to contact profile API endpoints without CSRF tokens from unexpected sources.

SIEM Query:

source="wordpress.log" AND "mail-mint" AND "contact/profile" AND status=200 AND NOT csrf_token=*

🔗 References

📤 Share This