CVE-2025-11967

HIGH

Mail Mint <1.18.10 - RCE

Title source: llm
STIX 2.1

Description

The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Scores

CVSS v3 7.2
EPSS 0.0022
EPSS Percentile 44.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (2)
getwpfunnels/Mail Mint – Email Marketing, Newsletter, Email Automation & WooCommerce Emails < 1.18.10
getwpfunnels/Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more < 1.18.10
Published Nov 08, 2025
Tracked Since Feb 18, 2026