Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5703: CWE-862 Missing Authorization in icegram Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce

0
Medium
VulnerabilityCVE-2024-5703cvecve-2024-5703cwe-862
Published: Wed Jul 17 2024 (07/17/2024, 07:32:18 UTC)
Source: CVE Database V5
Vendor/Project: icegram
Product: Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce

Description

CVE-2024-5703 is a medium severity vulnerability in the WordPress plugin 'Email Subscribers by Icegram Express' affecting all versions up to 5. 7. 26. The flaw is due to missing authorization checks on the plugin's API, allowing authenticated users with Subscriber-level access or higher to add, edit, or delete audience users via the API if it is enabled. Exploitation does not require user interaction but does require at least low-level authenticated access. The vulnerability impacts the integrity of subscriber data but does not affect confidentiality or availability directly. No known exploits are currently reported in the wild. Organizations using this plugin for email marketing and automation on WordPress and WooCommerce should prioritize patching or applying mitigations to prevent unauthorized manipulation of subscriber lists. Countries with significant WordPress usage and e-commerce activity are most at risk. The CVSS score is 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:47:08 UTC

Technical Analysis

CVE-2024-5703 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WordPress plugin 'Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce.' This plugin is widely used for managing email marketing campaigns and subscriber lists. The vulnerability arises because the plugin's API lacks proper capability checks, allowing any authenticated user with Subscriber-level permissions or higher to access the API endpoints. Through this unauthorized API access, attackers can add, modify, or delete audience users, thereby compromising the integrity of subscriber data. The flaw affects all versions up to and including 5.7.26. Exploitation requires no user interaction but does require authentication at a low privilege level, which is often easy to obtain in WordPress environments due to common user roles. The vulnerability does not expose confidential data directly nor does it impact system availability. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, and privileges required. No patches or exploits are currently publicly available, but the risk remains significant for sites relying on this plugin for subscriber management. The vulnerability could be leveraged to manipulate mailing lists, potentially enabling phishing or spam campaigns originating from compromised subscriber data.

Potential Impact

The primary impact of CVE-2024-5703 is on the integrity of subscriber data managed by the affected plugin. Unauthorized modification or deletion of audience users can disrupt marketing campaigns, cause loss of subscriber trust, and potentially facilitate further attacks such as phishing or spam by injecting malicious recipients or removing legitimate ones. While confidentiality and availability are not directly compromised, the manipulation of subscriber lists can have reputational and operational consequences for organizations. Attackers with Subscriber-level access, which is a low privilege role, can exploit this vulnerability, increasing the risk in environments with multiple users or weak access controls. Organizations relying heavily on WordPress and WooCommerce for e-commerce and marketing may face disruptions in customer engagement and potential regulatory compliance issues if subscriber data is mishandled. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.

Mitigation Recommendations

To mitigate CVE-2024-5703, organizations should immediately update the 'Email Subscribers by Icegram Express' plugin to a version that includes proper authorization checks once available. Until a patch is released, administrators should disable the plugin's API if it is not essential to operations, thereby preventing unauthorized API access. Additionally, review and tighten user role assignments to ensure that Subscriber-level accounts are limited and monitored, minimizing the number of users with potential to exploit this flaw. Implement strong authentication mechanisms such as multi-factor authentication (MFA) for all WordPress users to reduce the risk of account compromise. Regularly audit user activity logs for suspicious API usage or subscriber list changes. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the plugin endpoints. Finally, maintain regular backups of subscriber data to enable recovery in case of unauthorized modifications or deletions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-06T16:54:13.986Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6befb7ef31ef0b55cc81

Added to database: 2/25/2026, 9:38:55 PM

Last enriched: 2/26/2026, 2:47:08 AM

Last updated: 2/26/2026, 8:02:47 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats