CVE-2025-10638: CWE-862 Missing Authorization in NS Maintenance Mode for WP
The NS Maintenance Mode for WP WordPress plugin through 1.3.1 lacks authorization in its subscriber export function allowing unauthenticated attackers to download a list of a site's subscribers containing their name and email address
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-10638 affects the NS Maintenance Mode for WP WordPress plugin versions up to 1.3.1. It is classified under CWE-862, indicating missing authorization controls. Specifically, the subscriber export function within the plugin lacks proper authorization checks, allowing any unauthenticated attacker to remotely access and download a list of subscribers containing personally identifiable information such as names and email addresses. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. The vulnerability does not require authentication, making it trivial for attackers to exploit. Although no public exploits are known yet, the exposure of subscriber data can facilitate further attacks like phishing or spam campaigns. The plugin is commonly used in WordPress sites to manage maintenance mode, often on sites with subscriber-based content or newsletters. The lack of a patch at the time of reporting necessitates immediate mitigation steps by administrators. The vulnerability's impact is limited to data confidentiality breaches, but the sensitivity of subscriber information makes it a significant privacy concern.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of subscriber data, which can lead to privacy violations under regulations such as GDPR. The leakage of names and email addresses can facilitate targeted phishing, spear-phishing, and spam campaigns, potentially leading to further compromise or reputational damage. Organizations relying on WordPress sites with subscriber lists for marketing, communications, or membership management are particularly vulnerable. Although the vulnerability does not affect site availability or integrity, the breach of subscriber confidentiality can undermine user trust and result in regulatory penalties. The impact is more pronounced for entities handling large subscriber bases or sensitive subscriber data. Additionally, the exposure of subscriber information can be leveraged by threat actors for social engineering attacks against the organization or its users.
Mitigation Recommendations
Administrators should immediately review the usage of the NS Maintenance Mode for WP plugin and disable or restrict the subscriber export functionality until a security patch is released. Access to maintenance mode features should be limited to authenticated and authorized users only, ideally through role-based access controls or IP whitelisting. Monitoring web server logs for unusual access patterns to the export endpoint can help detect exploitation attempts. If possible, temporarily uninstalling or replacing the plugin with a more secure alternative is advisable. Organizations should also ensure that subscriber data is minimized and encrypted where feasible. Regular audits of WordPress plugins for security updates and vulnerabilities should be part of the security hygiene. Finally, informing subscribers about potential data exposure and advising caution against phishing attempts can mitigate downstream risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-10638: CWE-862 Missing Authorization in NS Maintenance Mode for WP
Description
The NS Maintenance Mode for WP WordPress plugin through 1.3.1 lacks authorization in its subscriber export function allowing unauthenticated attackers to download a list of a site's subscribers containing their name and email address
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-10638 affects the NS Maintenance Mode for WP WordPress plugin versions up to 1.3.1. It is classified under CWE-862, indicating missing authorization controls. Specifically, the subscriber export function within the plugin lacks proper authorization checks, allowing any unauthenticated attacker to remotely access and download a list of subscribers containing personally identifiable information such as names and email addresses. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. The vulnerability does not require authentication, making it trivial for attackers to exploit. Although no public exploits are known yet, the exposure of subscriber data can facilitate further attacks like phishing or spam campaigns. The plugin is commonly used in WordPress sites to manage maintenance mode, often on sites with subscriber-based content or newsletters. The lack of a patch at the time of reporting necessitates immediate mitigation steps by administrators. The vulnerability's impact is limited to data confidentiality breaches, but the sensitivity of subscriber information makes it a significant privacy concern.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of subscriber data, which can lead to privacy violations under regulations such as GDPR. The leakage of names and email addresses can facilitate targeted phishing, spear-phishing, and spam campaigns, potentially leading to further compromise or reputational damage. Organizations relying on WordPress sites with subscriber lists for marketing, communications, or membership management are particularly vulnerable. Although the vulnerability does not affect site availability or integrity, the breach of subscriber confidentiality can undermine user trust and result in regulatory penalties. The impact is more pronounced for entities handling large subscriber bases or sensitive subscriber data. Additionally, the exposure of subscriber information can be leveraged by threat actors for social engineering attacks against the organization or its users.
Mitigation Recommendations
Administrators should immediately review the usage of the NS Maintenance Mode for WP plugin and disable or restrict the subscriber export functionality until a security patch is released. Access to maintenance mode features should be limited to authenticated and authorized users only, ideally through role-based access controls or IP whitelisting. Monitoring web server logs for unusual access patterns to the export endpoint can help detect exploitation attempts. If possible, temporarily uninstalling or replacing the plugin with a more secure alternative is advisable. Organizations should also ensure that subscriber data is minimized and encrypted where feasible. Regular audits of WordPress plugins for security updates and vulnerabilities should be part of the security hygiene. Finally, informing subscribers about potential data exposure and advising caution against phishing attempts can mitigate downstream risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-17T13:34:17.993Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f875a3431d95e35de16144
Added to database: 10/22/2025, 6:11:47 AM
Last enriched: 10/29/2025, 6:18:05 AM
Last updated: 10/30/2025, 6:40:50 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumCVE-2025-10636: CWE-79 Cross-Site Scripting (XSS) in NS Maintenance Mode for WP
HighData Leak Outs Students of Iran's MOIS Training Academy
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.