Description

The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

INFO

Published Date :

2025-11-08T09:28:11.511Z

Last Modified :

2025-11-10T14:13:37.397Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2025-11967 vulnerability.

Vendors Products
Getwpfunnels
  • Mail Mint
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact