Description
The Newsletter – Send awesome emails from WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.1.0. This is due to missing or incorrect nonce validation on the hook_newsletter_action() function. This makes it possible for unauthenticated attackers to unsubscribe newsletter subscribers via a forged request granted they can trick a logged-in user into performing an action such as clicking on a link.
Published: 2026-01-20
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unsubscribes newsletter subscribers via CSRF
Action: Apply Patch
AI Analysis

Impact

The Newsletter plugin lacks proper nonce validation in the hook_newsletter_action function, exposing it to Cross‑Site Request Forgery (CWE‑352). An attacker can forge a request that, when a logged‑in user clicks a malicious link, removes a subscriber from the newsletter list without the user’s knowledge. This flaw can erode a site’s subscription base and undermine user trust, though it does not grant code execution or broad system access.

Affected Systems

The vulnerability affects all versions of the "Newsletter – Send awesome emails from WordPress" plugin distributed by satollo, specifically releases up through version 9.1.0.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, while an EPSS score of less than 1 % suggests a low probability of exploitation at present. The flaw is not listed in the CISA KEV catalogue. Availability of the vulnerability depends on an attacker convincing a legitimate user to visit a crafted URL; the attacker requires no special privileges beyond creating a forged request. The consequence is the irreversible removal of subscribers, which can impact marketing efforts and audience engagement.

Generated by OpenCVE AI on April 15, 2026 at 19:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Newsletter plugin to version 9.1.1 or later to restore proper nonce validation.
  • If an update cannot be applied immediately, modify the unsubscription handler to enforce nonce checks or remove the public unsubscription endpoint entirely.
  • Deploy a web application firewall or security plugin to block or rate‑limit requests to the unsubscription URL that lack a valid nonce.

Generated by OpenCVE AI on April 15, 2026 at 19:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Satollo
Satollo newsletter – Send Awesome Emails From Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Satollo
Satollo newsletter – Send Awesome Emails From Wordpress
Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 02:00:00 +0000

Type Values Removed Values Added
Description The Newsletter – Send awesome emails from WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.1.0. This is due to missing or incorrect nonce validation on the hook_newsletter_action() function. This makes it possible for unauthenticated attackers to unsubscribe newsletter subscribers via a forged request granted they can trick a logged-in user into performing an action such as clicking on a link.
Title Newsletter – Send awesome emails from WordPress <= 9.1.0 - Cross-Site Request Forgery to Newsletter Unsubscription
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

Satollo Newsletter – Send Awesome Emails From Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:15.083Z

Reserved: 2026-01-16T16:43:52.499Z

Link: CVE-2026-1051

cve-icon Vulnrichment

Updated: 2026-01-20T20:33:56.009Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T02:15:46.423

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:15:12Z

Weaknesses