Description
Missing Authorization vulnerability in MailerLite MailerLite official-mailerlite-sign-up-forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MailerLite: from n/a through <= 1.7.18.
Published: 2026-02-19
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Broken Access Control
Action: Apply Patch
AI Analysis

Impact

Missing authorization in the MailerLite official‑mailerlite‑sign‑up‑forms plugin up to version 1.7.18 permits attackers to access and manipulate protected functionality. The vulnerability, classified as CWE‑862, could allow an unauthenticated or low‑privileged user to execute actions reserved for higher‑privileged users, potentially exposing sensitive user data or modifying sign‑up form configurations. The impact is a loss of integrity and confidentiality within the WordPress site hosting the plugin.

Affected Systems

The issue affects the MailerLite official‑mailerlite‑sign‑up‑forms WordPress plugin from the initial release through any version 1.7.18 or earlier. All WordPress installations using this plugin version are potentially vulnerable until an up‑to‑date patch is applied.

Risk and Exploitability

The CVSS base score of 4.3 indicates moderate risk, and the EPSS score of less than 1% suggests a very low realistic exploitation probability. The vulnerability is not currently listed in the CISA KEV catalog, implying no known active exploitation. Attackers would need to target the plugin’s protected endpoints, which may require some level of authentication or rely on misconfigurations that relax access control. In the absence of a public exploit, the threat remains theoretical but should be mitigated promptly to avoid potential privilege escalation if exploited in the future.

Generated by OpenCVE AI on April 16, 2026 at 00:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MailerLite official‑mailerlite‑sign‑up‑forms plugin to a version newer than 1.7.18
  • Review and lock down any custom roles or capabilities that interact with the plugin
  • Disable or remove the plugin if it is no longer required
  • Regularly check for official security advisories from the plugin maintainer

Generated by OpenCVE AI on April 16, 2026 at 00:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Mailerlite
Mailerlite mailerlite
Wordpress
Wordpress wordpress
Vendors & Products Mailerlite
Mailerlite mailerlite
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in MailerLite MailerLite official-mailerlite-sign-up-forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects MailerLite: from n/a through <= 1.7.18.
Title WordPress MailerLite plugin <= 1.7.18 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Mailerlite Mailerlite
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:57.365Z

Reserved: 2026-02-02T12:53:26.262Z

Link: CVE-2026-25420

cve-icon Vulnrichment

Updated: 2026-02-20T15:18:41.820Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T09:16:23.740

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25420

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:15:18Z

Weaknesses