The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
History

Fri, 16 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mailerlite
Mailerlite mailerlite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Mailerlite
Mailerlite mailerlite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
Title MailerLite - WooCommerce integration <= 3.1.3 - Missing Authorization to Data Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-01-16T04:44:35.744Z

Updated: 2026-01-16T14:38:41.237Z

Reserved: 2026-01-15T16:35:54.267Z

Link: CVE-2026-1000

cve-icon Vulnrichment

Updated: 2026-01-16T14:38:33.875Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-16T05:16:17.283

Modified: 2026-01-16T15:55:12.257

Link: CVE-2026-1000

cve-icon Redhat

No data.