PHP Object Injection in WP Mail Logging Plugin for WordPress
CVE-2026-2471

7.5HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
28 February 2026

What is CVE-2026-2471?

The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection due to unsafe deserialization of untrusted input from the email log message field. The BaseModel constructor calls maybe_unserialize() on all properties obtained from the database without proper validation, allowing unauthenticated attackers to inject malicious PHP Objects. By submitting a double-serialized payload through public forms (e.g., Contact Form 7), the injected payload may be deserialized when an admin views the logged email. Although the vulnerable software does not inherently support a PHP Object Payload (POP) chain, if additional plugins or themes with a POP chain are present, attackers could execute harmful actions like file deletion, data retrieval, or remote code execution.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

WP Mail Logging * <= 1.15.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Quốc Huy
.