Unauthorized Data Modification in Hustle Email Marketing Plugin for WordPress
CVE-2026-2263

5.3MEDIUM

What is CVE-2026-2263?

The Hustle Email Marketing plugin for WordPress has a vulnerability that allows unauthorized data modification due to a lack of capability checks on the 'hustle_module_converted' AJAX action. This security flaw in all versions up to and including 7.8.10.2 permits unauthenticated attackers to forge conversion tracking events for any Hustle module, including those that are in draft status and not visible to users. As a result, attackers can manipulate marketing analytics and alter conversion statistics, potentially misleading site owners about their marketing performance and effectiveness.

Affected Version(s)

Hustle – Email Marketing, Lead Generation, Optins, Popups 0 <= 7.8.10.2

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nguyen C
.