<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Acymailing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/acymailing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 06:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/acymailing/feed.xml" rel="self" type="application/rss+xml"/><item><title>AcyMailing Plugin Privilege Escalation Vulnerability (CVE-2026-3614)</title><link>https://feed.craftedsignal.io/briefs/2026-04-acymailing-privesc/</link><pubDate>Thu, 16 Apr 2026 06:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-acymailing-privesc/</guid><description>The AcyMailing plugin for WordPress is vulnerable to privilege escalation (CVE-2026-3614), allowing authenticated attackers with subscriber-level access to gain administrative privileges.</description><content:encoded><![CDATA[<p>The AcyMailing plugin for WordPress, a popular email marketing tool, contains a critical privilege escalation vulnerability, tracked as CVE-2026-3614. Affecting versions 9.11.0 through 10.8.1, the vulnerability stems from a missing capability check on the <code>wp_ajax_acymailing_router</code> AJAX handler. This oversight allows authenticated attackers with minimal privileges (Subscriber level or higher) to bypass access controls intended to restrict access to administrative functions. Successful exploitation of this flaw allows attackers to perform actions reserved for administrators, including modifying configuration settings, enabling autologin features, and ultimately, compromising the entire WordPress installation. This is a critical vulnerability due to the widespread use of AcyMailing and the potential for complete site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains subscriber-level access to the WordPress site (e.g., through registration or compromised credentials).</li>
<li>Attacker crafts a malicious AJAX request targeting the <code>wp_ajax_acymailing_router</code> endpoint. This request attempts to access admin-only controllers without proper authentication.</li>
<li>Due to the missing capability check, the server processes the request, granting the attacker access to restricted administrative functions within AcyMailing.</li>
<li>The attacker enables the autologin feature within AcyMailing&rsquo;s configuration, using the exposed administrative controller.</li>
<li>The attacker creates a new AcyMailing subscriber.  Crucially, the attacker injects a malicious <code>cms_id</code> value into the subscriber&rsquo;s data. This <code>cms_id</code> is crafted to point to the WordPress user account they wish to impersonate (e.g., an administrator account).</li>
<li>The attacker retrieves the autologin URL generated for the newly created (and malicious) subscriber.</li>
<li>The attacker accesses the autologin URL.</li>
<li>The AcyMailing plugin, configured with the now-enabled autologin feature, authenticates the attacker as the user specified by the injected <code>cms_id</code>, granting them full administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3614 allows an attacker to escalate privileges from a subscriber to an administrator. This grants the attacker complete control over the WordPress website, including the ability to modify content, install malicious plugins, create new administrator accounts, and potentially compromise the underlying server. This vulnerability impacts any WordPress site running a vulnerable version of the AcyMailing plugin (9.11.0 through 10.8.1). The severity is critical due to the ease of exploitation and the potential for complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the AcyMailing plugin to the latest version (greater than 10.8.1) to patch CVE-2026-3614.</li>
<li>Deploy the Sigma rule &ldquo;AcyMailing Unauthorized AJAX Access Attempt&rdquo; to detect attempts to exploit the vulnerability by monitoring for access to the <code>wp_ajax_acymailing_router</code> endpoint from non-administrator users.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action=acymailing_router</code> parameter, as this is the entry point for exploiting CVE-2026-3614.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>privilege-escalation</category><category>acymailing</category></item></channel></rss>