Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

0
Medium
VulnerabilityCVE-2025-12348cvecve-2025-12348cwe-306
Published: Fri Dec 12 2025 (12/12/2025, 09:20:29 UTC)
Source: CVE Database V5
Vendor/Project: icegram
Product: Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

Description

The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.

AI-Powered Analysis

AILast updated: 12/12/2025, 09:53:47 UTC

Technical Analysis

CVE-2025-12348 identifies a missing authentication vulnerability (CWE-306) in the Icegram Express plugin for WordPress and WooCommerce, specifically in versions up to and including 5.9.10. The vulnerability exists in the run_action_scheduler_task function, which is responsible for executing scheduled actions such as sending emails, running maintenance tasks, or other privileged operations. Due to insufficient authorization checks, unauthenticated attackers can guess or enumerate action IDs and trigger these scheduled tasks prematurely or multiple times. This can cause unintended side effects including repeated email sends, manipulation of newsletter states, or excessive resource consumption on the server. The vulnerability is remotely exploitable over the network without any privileges or user interaction, with a CVSS 3.1 base score of 5.3 (medium severity). Although no public exploits have been reported, the flaw poses a risk to the integrity of marketing workflows and system stability. The plugin is widely used in WordPress environments for email marketing and newsletter management, making affected sites potential targets for abuse or denial-of-service conditions. No official patches have been linked yet, so mitigation relies on monitoring, restricting access, or disabling vulnerable functionality until updates are available.

Potential Impact

For European organizations, this vulnerability can disrupt critical marketing and communication workflows by allowing attackers to prematurely or repeatedly trigger email campaigns or maintenance tasks. This can lead to reputational damage due to spam or unintended email sends, increased operational costs from resource exhaustion, and potential loss of control over automated marketing processes. Organizations relying heavily on WordPress and WooCommerce for customer engagement, especially in sectors like retail, media, and services, may experience degraded service availability or customer trust issues. Furthermore, repeated or manipulated scheduled tasks could interfere with data integrity related to subscriber management. Although the vulnerability does not directly expose sensitive data, the integrity impact and potential denial-of-service effects pose a significant operational risk. Given the widespread use of WordPress in Europe, the threat surface is considerable, particularly for SMEs and enterprises using this plugin for email marketing automation.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the run_action_scheduler_task endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests targeting this function or guessing action IDs. Administrators should monitor logs for unusual or repeated calls to scheduled task endpoints and limit exposure by disabling or restricting the Icegram Express plugin if feasible. Employing rate limiting on relevant endpoints can reduce the risk of repeated exploitation. Until an official patch is released, organizations should consider isolating WordPress instances or using security plugins that enforce stricter authorization checks on plugin actions. Regular backups and monitoring of email campaign logs can help detect and respond to abuse. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once available to fully remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T14:21:51.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693be422406b3dd4e02223ca

Added to database: 12/12/2025, 9:45:06 AM

Last enriched: 12/12/2025, 9:53:47 AM

Last updated: 12/14/2025, 10:41:50 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats