CVE-2026-1447 PUBLISHED

Mail Mint <= 1.19.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Assigner: Wordfence
Reserved: 26.01.2026 Published: 03.02.2026 Updated: 03.02.2026

The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to missing sanitization and escaping this can lead to stored Cross-Site Scripting.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVSS Score: 5.4

Product Status

Vendor getwpfunnels
Product Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
Versions Default: unaffected
  • affected from * to 1.19.2 (incl.)

Credits

  • Bui Van Y finder

References

Problem Types

  • CWE-352 Cross-Site Request Forgery (CSRF) CWE