Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High2
Medium2
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2026-04-15

CVE-2026-2025 - Mail Mint Plugin

The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one of its REST API endpoint, allowing unauthenticated users to call it and retrieve the email addresses of users on the blog

PLUGIN Mail Mint

CVE-2026-2025

HIGH CVSS 7.5 2026-03-04
Threat Entry Updated 2026-04-15

CVE-2026-1258 - Mail Mint Plugin

The Mail Mint plugin for WordPress is vulnerable to blind SQL Injection via the 'forms', 'automation', 'email/templates', and 'contacts/import/tutorlms/map' API endpoints in all versions up to, and including, 1.19.2 . This is due to insufficient escaping on the user supplied 'order-by', 'order-type', and 'selectedCourses' parameters and lack of sufficient preparation on the existing SQL queries. This makes it possible for authenticated attackers, with administrator level access and above, to append additional SQL queries into already existing queries.

PLUGIN Mail Mint

CVE-2026-1258

MEDIUM CVSS 4.9 2026-02-14
Threat Entry Updated 2026-04-15

CVE-2026-1447 - Mail Mint Plugin

The Mail Mint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.19.2. This is due to missing nonce validation on the create_or_update_note function. This makes it possible for unauthenticated attackers to create or update contact notes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Due to missing sanitization and escaping this can lead to stored Cross-Site Scripting.

PLUGIN Mail Mint

CVE-2026-1447

MEDIUM CVSS 5.4 2026-02-03
Threat Entry Updated 2025-11-12

CVE-2025-11967 - Mail Mint Plugin

The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Mail Mint

CVE-2025-11967

HIGH CVSS 7.2 2025-11-08
Scroll to top