The Hostinger Reach – AI-Powered Email Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'handle_ajax_action' function in all versions up to, and including, 1.3.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to use the 'hostinger_reach_connection_notice_action' action to update the API key value stored in the database. This vulnerability can only be exploited when the plugin is not connected to a site and no API key value exists in the database.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hostinger
Hostinger hostinger Reach – Ai-powered Email Marketing For Wordpress Wordpress Wordpress wordpress |
|
| Vendors & Products |
Hostinger
Hostinger hostinger Reach – Ai-powered Email Marketing For Wordpress Wordpress Wordpress wordpress |
Wed, 13 May 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Hostinger Reach – AI-Powered Email Marketing for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'handle_ajax_action' function in all versions up to, and including, 1.3.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to use the 'hostinger_reach_connection_notice_action' action to update the API key value stored in the database. This vulnerability can only be exploited when the plugin is not connected to a site and no API key value exists in the database. | |
| Title | Hostinger Reach <= 1.3.8 - Missing Authorization to Authenticated (Subscriber+) Integration API Key Update | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-05-13T08:26:35.712Z
Updated: 2026-05-13T10:19:59.430Z
Reserved: 2026-02-14T19:14:40.183Z
Link: CVE-2026-2515
Updated: 2026-05-13T10:18:11.026Z
Status : Deferred
Published: 2026-05-13T13:01:39.920
Modified: 2026-05-13T14:43:46.717
Link: CVE-2026-2515
No data.