The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 16 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mailerlite
Mailerlite mailerlite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Mailerlite
Mailerlite mailerlite
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The MailerLite - WooCommerce integration plugin for WordPress is vulnerable to unauthorized data modification and deletion in all versions up to, and including, 3.1.3. This is due to missing capability checks on the resetIntegration() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's integration settings, delete all plugin options, and drop the plugin's database tables (woo_mailerlite_carts and woo_mailerlite_jobs), resulting in complete loss of plugin data including customer abandoned cart information and sync job history.
Title MailerLite - WooCommerce integration <= 3.1.3 - Missing Authorization to Data Deletion
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-01-16T14:38:41.237Z

Reserved: 2026-01-15T16:35:54.267Z

Link: CVE-2026-1000

cve-icon Vulnrichment

Updated: 2026-01-16T14:38:33.875Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-16T05:16:17.283

Modified: 2026-01-16T15:55:12.257

Link: CVE-2026-1000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-16T13:41:54Z

Weaknesses