Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10691: CWE-352 Cross-Site Request Forgery (CSRF) in yudiz Easy Email Subscription

0
Medium
VulnerabilityCVE-2025-10691cvecve-2025-10691cwe-352
Published: Thu Nov 06 2025 (11/06/2025, 03:27:01 UTC)
Source: CVE Database V5
Vendor/Project: yudiz
Product: Easy Email Subscription

Description

The Easy Email Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the show_editsub_page() function. This makes it possible for unauthenticated attackers to delete arbitrary subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 11/13/2025, 04:42:03 UTC

Technical Analysis

CVE-2025-10691 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the yudiz Easy Email Subscription plugin for WordPress, affecting all versions up to and including 1.3. The vulnerability stems from missing or incorrect nonce validation in the show_editsub_page() function, which is responsible for managing subscriber edits. Nonces in WordPress are security tokens used to verify that requests originate from legitimate users and not from malicious third parties. The absence of proper nonce checks means that an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link), causes the deletion of arbitrary subscribers without the administrator’s explicit consent. This attack does not require the attacker to be authenticated but does require user interaction from a privileged user, making it a classic CSRF scenario. The impact is primarily on the integrity of subscriber data, as attackers can delete subscribers, potentially disrupting marketing or communication efforts. Confidentiality and availability are not directly affected. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low complexity, no privileges required, user interaction required, and unchanged scope. No public exploits or patches are currently available, so organizations must rely on mitigating controls until an official fix is released.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized deletion of email subscribers, undermining marketing campaigns, customer engagement, and communication channels. Organizations relying heavily on email subscription lists for business operations, especially in sectors like e-commerce, media, and digital marketing, may experience data integrity issues and loss of subscriber trust. Although the vulnerability does not expose sensitive subscriber information or cause service outages, the manipulation of subscriber data can disrupt business workflows and lead to reputational damage. Since exploitation requires tricking an administrator into clicking a malicious link, organizations with less mature security awareness programs are at higher risk. The impact is more pronounced for organizations with large subscriber bases and those that use the affected plugin extensively on public-facing WordPress sites.

Mitigation Recommendations

1. Implement proper nonce validation in the show_editsub_page() function to ensure all requests modifying subscriber data are verified as legitimate. 2. Restrict access to subscription management pages and functions to only trusted administrators and enforce least privilege principles. 3. Educate site administrators and privileged users about the risks of phishing and social engineering attacks, emphasizing caution when clicking links from untrusted sources. 4. Monitor WordPress plugin updates from yudiz and apply patches promptly once available. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting subscription management endpoints. 6. Consider temporarily disabling or replacing the Easy Email Subscription plugin if immediate patching is not possible, especially in high-risk environments. 7. Conduct regular security audits and penetration testing focused on WordPress plugins and administrative interfaces to identify and remediate similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-09-18T14:54:06.118Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c1959fd0d6d226485656f

Added to database: 11/6/2025, 3:43:21 AM

Last enriched: 11/13/2025, 4:42:03 AM

Last updated: 12/20/2025, 5:22:15 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats