CVE-2025-10691: CWE-352 Cross-Site Request Forgery (CSRF) in yudiz Easy Email Subscription
The Easy Email Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the show_editsub_page() function. This makes it possible for unauthenticated attackers to delete arbitrary subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2025-10691 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the yudiz Easy Email Subscription plugin for WordPress, affecting all versions up to and including 1.3. The vulnerability stems from missing or incorrect nonce validation in the show_editsub_page() function, which is responsible for managing subscriber edits. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. The absence of proper nonce checks means that an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), causes the deletion of arbitrary subscribers without the administrator’s explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a classic CSRF scenario. The impact is primarily on the integrity of subscriber data, as attackers can delete subscribers, potentially disrupting marketing or communication efforts. Confidentiality and availability are not directly affected. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low complexity, no privileges required, user interaction required, and unchanged scope. No public exploits or patches are currently available, so organizations must rely on mitigating controls until an official fix is released.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized deletion of email subscribers, undermining marketing campaigns, customer engagement, and communication channels. Organizations relying heavily on email subscription lists for business operations, especially in sectors like e-commerce, media, and digital marketing, may experience data integrity issues and loss of subscriber trust. Although the vulnerability does not expose sensitive subscriber information or cause service outages, the manipulation of subscriber data can disrupt business workflows and lead to reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, organizations with less mature security awareness programs are at higher risk. The impact is more pronounced for organizations with large subscriber bases and those that use the affected plugin extensively on public-facing WordPress sites.
Mitigation Recommendations
1. Implement proper nonce validation in the show_editsub_page() function to ensure all requests modifying subscriber data are verified as legitimate. 2. Restrict access to subscription management pages and functions to only trusted administrators and enforce least privilege principles. 3. Educate site administrators and privileged users about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 4. Monitor WordPress plugin updates from yudiz and apply patches promptly once available. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting subscription management endpoints. 6. Consider temporarily disabling or replacing the Easy Email Subscription plugin if immediate patching is not possible, especially in high-risk environments. 7. Conduct regular security audits and penetration testing focused on WordPress plugins and administrative interfaces to identify and remediate similar vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-10691: CWE-352 Cross-Site Request Forgery (CSRF) in yudiz Easy Email Subscription
Description
The Easy Email Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the show_editsub_page() function. This makes it possible for unauthenticated attackers to delete arbitrary subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2025-10691 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the yudiz Easy Email Subscription plugin for WordPress, affecting all versions up to and including 1.3. The vulnerability stems from missing or incorrect nonce validation in the show_editsub_page() function, which is responsible for managing subscriber edits. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. The absence of proper nonce checks means that an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), causes the deletion of arbitrary subscribers without the administrator’s explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a classic CSRF scenario. The impact is primarily on the integrity of subscriber data, as attackers can delete subscribers, potentially disrupting marketing or communication efforts. Confidentiality and availability are not directly affected. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low complexity, no privileges required, user interaction required, and unchanged scope. No public exploits or patches are currently available, so organizations must rely on mitigating controls until an official fix is released.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized deletion of email subscribers, undermining marketing campaigns, customer engagement, and communication channels. Organizations relying heavily on email subscription lists for business operations, especially in sectors like e-commerce, media, and digital marketing, may experience data integrity issues and loss of subscriber trust. Although the vulnerability does not expose sensitive subscriber information or cause service outages, the manipulation of subscriber data can disrupt business workflows and lead to reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, organizations with less mature security awareness programs are at higher risk. The impact is more pronounced for organizations with large subscriber bases and those that use the affected plugin extensively on public-facing WordPress sites.
Mitigation Recommendations
1. Implement proper nonce validation in the show_editsub_page() function to ensure all requests modifying subscriber data are verified as legitimate. 2. Restrict access to subscription management pages and functions to only trusted administrators and enforce least privilege principles. 3. Educate site administrators and privileged users about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 4. Monitor WordPress plugin updates from yudiz and apply patches promptly once available. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting subscription management endpoints. 6. Consider temporarily disabling or replacing the Easy Email Subscription plugin if immediate patching is not possible, especially in high-risk environments. 7. Conduct regular security audits and penetration testing focused on WordPress plugins and administrative interfaces to identify and remediate similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-18T14:54:06.118Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690c1959fd0d6d226485656f
Added to database: 11/6/2025, 3:43:21 AM
Last enriched: 11/13/2025, 4:42:03 AM
Last updated: 12/20/2025, 5:22:15 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.