Medium severity4.3NVD Advisory· Published Apr 22, 2026· Updated Apr 22, 2026
CVE-2026-1930
CVE-2026-1930
Description
The Emailchef plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the page_options_ajax_disconnect() function in all versions up to, and including, 3.5.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's settings via the 'emailchef_disconnect' AJAX action.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/emailchef/tags/3.5.1/admin/class-emailchef-admin.phpnvd
- plugins.trac.wordpress.org/browser/emailchef/tags/3.5.1/admin/class-emailchef-admin.phpnvd
- plugins.trac.wordpress.org/browser/emailchef/trunk/admin/class-emailchef-admin.phpnvd
- plugins.trac.wordpress.org/browser/emailchef/trunk/admin/class-emailchef-admin.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/3ae02595-17f0-472d-bc4f-6169cce7a583nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 20, 2026 to April 26, 2026)Wordfence Blog · Apr 30, 2026