Description
The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 4.11.1. This is due to the plugin trusting the `_mc4wp_action` POST parameter without validation, allowing unauthenticated attackers to force the form to process unsubscribe actions instead of subscribe actions. This makes it possible for unauthenticated attackers to arbitrarily unsubscribe any email address from the connected Mailchimp audience via the `_mc4wp_action` parameter, granted they can obtain the form ID (which is publicly exposed in the HTML source).
Published: 2026-03-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Unsubscription
Action: Patch
AI Analysis

Impact

The CVE reveals that the MC4WP: Mailchimp for WordPress plugin accepts an unvalidated POST parameter named _mc4wp_action. This flaw allows an unauthenticated user to trigger an unsubscribe operation instead of the intended subscribe action. The effect is that an attacker can remove any email address from the configured Mailchimp audience, compromising the integrity of the marketing list. The weakness is identified as CWE-862 (Missing Authorization) and manifests as a moderate severity vulnerability with a CVSS score of 6.5.

Affected Systems

All installations of the MC4WP: Mailchimp for WordPress plugin up to, and including, version 4.11.1 are affected. The vulnerability is triggered via a publicly exposed form ID, which is displayed in the page’s HTML source. The plugin is developed by dvankooten:MC4WP: Mailchimp for WordPress and is used in WordPress sites that integrate with Mailchimp audiences.

Risk and Exploitability

The risk level is moderate (CVSS 6.5) with an exploit probability of less than 1% as indicated by EPSS. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by crafting a simple HTTP POST request to the form endpoint with the _mc4wp_action parameter set to trigger an unsubscribe, provided they know the public form ID. No authentication is required, making the attack straightforward for any user on the internet.

Generated by OpenCVE AI on March 17, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update MC4WP: Mailchimp for WordPress to a version newer than 4.11.1

Generated by OpenCVE AI on March 17, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Dvankooten
Dvankooten mc4wp: Mailchimp For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Dvankooten
Dvankooten mc4wp: Mailchimp For Wordpress
Wordpress
Wordpress wordpress

Wed, 11 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
Description The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 4.11.1. This is due to the plugin trusting the `_mc4wp_action` POST parameter without validation, allowing unauthenticated attackers to force the form to process unsubscribe actions instead of subscribe actions. This makes it possible for unauthenticated attackers to arbitrarily unsubscribe any email address from the connected Mailchimp audience via the `_mc4wp_action` parameter, granted they can obtain the form ID (which is publicly exposed in the HTML source).
Title MC4WP: Mailchimp for WordPress <= 4.11.1 - Missing Authorization to Unauthenticated Arbitrary Subscription Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

Dvankooten Mc4wp: Mailchimp For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-11T15:50:08.687Z

Reserved: 2026-02-02T20:27:48.205Z

Link: CVE-2026-1781

cve-icon Vulnrichment

Updated: 2026-03-11T15:50:05.885Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T02:16:03.493

Modified: 2026-03-11T13:52:47.683

Link: CVE-2026-1781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:38:23Z

Weaknesses