The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
History

Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
Title MailerLite - WooCommerce integration <= 3.1.3 - Missing Authorization to Data Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-01-16T04:44:35.744Z

Reserved: 2026-01-15T16:35:54.267Z

Link: CVE-2026-1000

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T05:16:17.283

Modified: 2026-01-16T05:16:17.283

Link: CVE-2026-1000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.