<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress Plugin &lt;= 10.8.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/acymailing--an-ultimate-newsletter-plugin-and-marketing-automation-solution-for-wordpress-plugin--10.8.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 08:17:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/acymailing--an-ultimate-newsletter-plugin-and-marketing-automation-solution-for-wordpress-plugin--10.8.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>AcyMailing WordPress Plugin Missing Authorization Vulnerability (CVE-2026-5200)</title><link>https://feed.craftedsignal.io/briefs/2026-05-acymailing-auth-bypass/</link><pubDate>Wed, 20 May 2026 08:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acymailing-auth-bypass/</guid><description>The AcyMailing plugin for WordPress is vulnerable to a missing authorization issue (CVE-2026-5200), allowing authenticated attackers with subscriber-level access to modify privileged AcyMailing configuration, export subscriber secret keys, and potentially achieve administrator account takeover if the administrator's email address is known.</description><content:encoded><![CDATA[<p>The AcyMailing plugin for WordPress, up to version 10.8.2, suffers from a missing authorization vulnerability (CVE-2026-5200). This flaw enables authenticated attackers with minimal subscriber-level privileges to bypass authorization checks and perform actions normally reserved for administrators. This includes modifying sensitive plugin configurations and exporting subscriber secret keys. A successful exploit could lead to a complete compromise of the WordPress installation, especially if the attacker knows the email address of an administrator, facilitating an account takeover. Defenders should prioritize patching and monitoring activity related to this plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker registers an account on the WordPress site, obtaining subscriber-level access.</li>
<li>The attacker authenticates to the WordPress site using their subscriber credentials.</li>
<li>The attacker crafts a malicious HTTP request to modify AcyMailing configuration settings, bypassing authorization checks.</li>
<li>The attacker modifies settings related to email sending or subscriber management within AcyMailing.</li>
<li>The attacker crafts a separate HTTP request to export subscriber secret keys, again bypassing authorization checks.</li>
<li>The attacker analyzes the exported secret keys to gain further access or impersonate subscribers.</li>
<li>If the attacker knows the administrator&rsquo;s email address, they leverage the modified settings and exported data to attempt an administrator account takeover.</li>
<li>Successful account takeover grants the attacker full control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to modify AcyMailing settings, potentially leading to spam campaigns originating from the compromised WordPress site. More critically, an attacker can export subscriber secret keys, which could be used for malicious purposes. If the administrator&rsquo;s email is known, the attacker can leverage these exploits to achieve full administrator account takeover, leading to website defacement, data theft, or complete system compromise. The severity of this issue is reflected in its CVSS v3.1 base score of 8.8.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the AcyMailing plugin to the latest version, which includes a fix for CVE-2026-5200.</li>
<li>Deploy the Sigma rules provided to detect unauthorized modification attempts on AcyMailing configuration.</li>
<li>Monitor WordPress web server logs for suspicious HTTP requests targeting AcyMailing endpoints, particularly those attempting to modify configuration settings.</li>
<li>Review AcyMailing access logs for any unusual activity originating from subscriber-level accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>acymailing</category><category>wordpress</category><category>authorization-bypass</category><category>privilege-escalation</category></item></channel></rss>