Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10638: CWE-862 Missing Authorization in NS Maintenance Mode for WP

0
Medium
VulnerabilityCVE-2025-10638cvecve-2025-10638cwe-862
Published: Wed Oct 22 2025 (10/22/2025, 06:00:02 UTC)
Source: CVE Database V5
Product: NS Maintenance Mode for WP

Description

The NS Maintenance Mode for WP WordPress plugin through 1.3.1 lacks authorization in its subscriber export function allowing unauthenticated attackers to download a list of a site's subscribers containing their name and email address

AI-Powered Analysis

AILast updated: 10/29/2025, 06:18:05 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10638 affects the NS Maintenance Mode for WP WordPress plugin versions up to 1.3.1. It is classified under CWE-862, indicating missing authorization controls. Specifically, the subscriber export function within the plugin lacks proper authorization checks, allowing any unauthenticated attacker to remotely access and download a list of subscribers containing personally identifiable information such as names and email addresses. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. The vulnerability does not require authentication, making it trivial for attackers to exploit. Although no public exploits are known yet, the exposure of subscriber data can facilitate further attacks like phishing or spam campaigns. The plugin is commonly used in WordPress sites to manage maintenance mode, often on sites with subscriber-based content or newsletters. The lack of a patch at the time of reporting necessitates immediate mitigation steps by administrators. The vulnerability's impact is limited to data confidentiality breaches, but the sensitivity of subscriber information makes it a significant privacy concern.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of subscriber data, which can lead to privacy violations under regulations such as GDPR. The leakage of names and email addresses can facilitate targeted phishing, spear-phishing, and spam campaigns, potentially leading to further compromise or reputational damage. Organizations relying on WordPress sites with subscriber lists for marketing, communications, or membership management are particularly vulnerable. Although the vulnerability does not affect site availability or integrity, the breach of subscriber confidentiality can undermine user trust and result in regulatory penalties. The impact is more pronounced for entities handling large subscriber bases or sensitive subscriber data. Additionally, the exposure of subscriber information can be leveraged by threat actors for social engineering attacks against the organization or its users.

Mitigation Recommendations

Administrators should immediately review the usage of the NS Maintenance Mode for WP plugin and disable or restrict the subscriber export functionality until a security patch is released. Access to maintenance mode features should be limited to authenticated and authorized users only, ideally through role-based access controls or IP whitelisting. Monitoring web server logs for unusual access patterns to the export endpoint can help detect exploitation attempts. If possible, temporarily uninstalling or replacing the plugin with a more secure alternative is advisable. Organizations should also ensure that subscriber data is minimized and encrypted where feasible. Regular audits of WordPress plugins for security updates and vulnerabilities should be part of the security hygiene. Finally, informing subscribers about potential data exposure and advising caution against phishing attempts can mitigate downstream risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-09-17T13:34:17.993Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f875a3431d95e35de16144

Added to database: 10/22/2025, 6:11:47 AM

Last enriched: 10/29/2025, 6:18:05 AM

Last updated: 10/30/2025, 6:40:50 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats