Description
The Emailchef plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the page_options_ajax_disconnect() function in all versions up to, and including, 3.5.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's settings via the 'emailchef_disconnect' AJAX action.
Published: 2026-04-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary plugin settings deletion by authenticated users
Action: Update Plugin
AI Analysis

Impact

The Emailchef WordPress plugin contains a missing capability check in the page_options_ajax_disconnect() routine. As a result, any authenticated user with Subscriber level permissions or higher can invoke the emailchef_disconnect AJAX action and delete the plugin’s configuration data, which may break email functionality and cause service disruption. This flaw is a classic authorization bypass, classified as CWE-862, and it does not allow exploitation to execute arbitrary code or gain higher privileges. The primary impact is loss of configuration integrity and potential downtime for sites relying on Emailchef for email handling.

Affected Systems

The vulnerability affects all releases of the Emailchef plugin from the earliest version through 3.5.1 released by the vendor hanicker:Emailchef. Systems running any of these versions on WordPress are exposed unless the plugin is removed or updated to a version later than 3.5.1.

Risk and Exploitability

The CVSS score for this issue is 4.3, placing it in the medium range. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need an authenticated session and Subscriber or higher access, which is relatively common in many WordPress sites. While the vulnerability does not provide direct code execution, deletion of configuration may lead to service disruption. Given the available attack vector, administrators should treat this issue as a priority to prevent service disruption.

Generated by OpenCVE AI on April 22, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Emailchef plugin to a version newer than 3.5.1 where the missing capability check has been restored.
  • If an update is not immediately possible, temporarily remove or deactivate the Emailchef plugin until a patch can be applied.
  • Review and tighten user role capabilities so that Subscriber or lower users cannot access AJAX endpoints that modify plugin settings; consider revoking emailchef_disconnect access from these roles.
  • Apply site‑wide security monitoring to detect unexpected AJAX traffic targeting Emailchef and investigate any anomalies promptly.

Generated by OpenCVE AI on April 22, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Hanicker
Hanicker emailchef
Wordpress
Wordpress wordpress
Vendors & Products Hanicker
Hanicker emailchef
Wordpress
Wordpress wordpress

Wed, 22 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Emailchef plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the page_options_ajax_disconnect() function in all versions up to, and including, 3.5.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's settings via the 'emailchef_disconnect' AJAX action.
Title Emailchef <= 3.5.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Settings Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Hanicker Emailchef
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-22T13:45:47.683Z

Reserved: 2026-02-04T20:54:31.865Z

Link: CVE-2026-1930

cve-icon Vulnrichment

Updated: 2026-04-22T13:45:40.317Z

cve-icon NVD

Status : Received

Published: 2026-04-22T10:16:51.000

Modified: 2026-04-22T10:16:51.000

Link: CVE-2026-1930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:43:42Z

Weaknesses