Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hanicker
Hanicker emailchef Wordpress Wordpress wordpress |
|
| Vendors & Products |
Hanicker
Hanicker emailchef Wordpress Wordpress wordpress |
Wed, 22 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Emailchef plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the page_options_ajax_disconnect() function in all versions up to, and including, 3.5.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's settings via the 'emailchef_disconnect' AJAX action. | |
| Title | Emailchef <= 3.5.1 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Settings Deletion | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-22T13:45:47.683Z
Reserved: 2026-02-04T20:54:31.865Z
Link: CVE-2026-1930
Updated: 2026-04-22T13:45:40.317Z
Status : Deferred
Published: 2026-04-22T10:16:51.000
Modified: 2026-04-22T20:22:50.570
Link: CVE-2026-1930
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:43:42Z