Description
The Creative Mail – Easier WordPress & WooCommerce Email Marketing plugin for WordPress is vulnerable to SQL Injection via the 'checkout_uuid' parameter in all versions up to, and including, 1.6.9. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query in the `has_checkout_consent()` method. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-20
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Creative Mail – Easier WordPress & WooCommerce Email Marketing plugin contains a flaw in the has_checkout_consent() method where the checkout_uuid parameter is not properly escaped or prepared. This allows a malicious actor to insert arbitrary SQL into the query, leading to unauthenticated execution of SQL statements. The vulnerability falls under CWE-89 and can be leveraged to read, modify, or delete data stored in the WordPress database, potentially exposing sensitive user information. The impact is a loss of confidentiality, integrity, and availability of the site’s data.

Affected Systems

Any WordPress site running the Creative Mail plugin version 1.6.9 or earlier is affected. The plugin is provided by constantcontact and is used to manage email marketing for WordPress and WooCommerce installations.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity level. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no documented widespread exploitation at the time of this analysis. Attackers can reach the vulnerable endpoint without authentication by sending crafted requests that include a malicious checkout_uuid value. Once the injection succeeds, the attacker can extract or tamper with database contents, compromising the entire site. The absence of authentication controls and the ability to augment the query directly make exploitation straightforward for any party capable of sending HTTP requests.

Generated by OpenCVE AI on May 20, 2026 at 03:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Creative Mail plugin to the latest version where the SQL injection is fixed.
  • If an immediate update is not feasible, protect the checkout_uuid endpoint by restricting access to authenticated users only or by removing the endpoint’s public exposure via server configuration or plugin settings.
  • Modify or patch the affected code to use prepared statements or proper escaping for all user-supplied parameters, following best practices for preventing SQL injection.
  • Implement a web application firewall that detects and blocks SQL injection patterns against the site.

Generated by OpenCVE AI on May 20, 2026 at 03:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Constantcontact
Constantcontact creative Mail – Easier Wordpress & Woocommerce Email Marketing
Wordpress
Wordpress wordpress
Vendors & Products Constantcontact
Constantcontact creative Mail – Easier Wordpress & Woocommerce Email Marketing
Wordpress
Wordpress wordpress

Wed, 20 May 2026 02:15:00 +0000

Type Values Removed Values Added
Description The Creative Mail – Easier WordPress & WooCommerce Email Marketing plugin for WordPress is vulnerable to SQL Injection via the 'checkout_uuid' parameter in all versions up to, and including, 1.6.9. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query in the `has_checkout_consent()` method. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Creative Mail – Easier WordPress & WooCommerce Email Marketing <= 1.6.9 - Unauthenticated SQL Injection via 'checkout_uuid' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Constantcontact Creative Mail – Easier Wordpress & Woocommerce Email Marketing
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-20T01:25:47.803Z

Reserved: 2026-03-11T14:46:25.631Z

Link: CVE-2026-3985

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-20T02:16:35.570

Modified: 2026-05-20T02:16:35.570

Link: CVE-2026-3985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:38:31Z

Weaknesses