CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
AI Analysis
Technical Summary
CVE-2025-12348 identifies a missing authentication vulnerability (CWE-306) in the Icegram Express plugin for WordPress and WooCommerce, specifically in versions up to and including 5.9.10. The vulnerability exists in the run_action_scheduler_task function, which is responsible for executing scheduled actions such as sending emails, running maintenance tasks, or other privileged operations. Due to insufficient authorization checks, unauthenticated attackers can guess or enumerate action IDs and trigger these scheduled tasks prematurely or multiple times. This can cause unintended side effects including repeated email sends, manipulation of newsletter states, or excessive resource consumption on the server. The vulnerability is remotely exploitable over the network without any privileges or user interaction, with a CVSS 3.1 base score of 5.3 (medium severity). Although no public exploits have been reported, the flaw poses a risk to the integrity of marketing workflows and system stability. The plugin is widely used in WordPress environments for email marketing and newsletter management, making affected sites potential targets for abuse or denial-of-service conditions. No official patches have been linked yet, so mitigation relies on monitoring, restricting access, or disabling vulnerable functionality until updates are available.
Potential Impact
For European organizations, this vulnerability can disrupt critical marketing and communication workflows by allowing attackers to prematurely or repeatedly trigger email campaigns or maintenance tasks. This can lead to reputational damage due to spam or unintended email sends, increased operational costs from resource exhaustion, and potential loss of control over automated marketing processes. Organizations relying heavily on WordPress and WooCommerce for customer engagement, especially in sectors like retail, media, and services, may experience degraded service availability or customer trust issues. Furthermore, repeated or manipulated scheduled tasks could interfere with data integrity related to subscriber management. Although the vulnerability does not directly expose sensitive data, the integrity impact and potential denial-of-service effects pose a significant operational risk. Given the widespread use of WordPress in Europe, the threat surface is considerable, particularly for SMEs and enterprises using this plugin for email marketing automation.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the run_action_scheduler_task endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests targeting this function or guessing action IDs. Administrators should monitor logs for unusual or repeated calls to scheduled task endpoints and limit exposure by disabling or restricting the Icegram Express plugin if feasible. Employing rate limiting on relevant endpoints can reduce the risk of repeated exploitation. Until an official patch is released, organizations should consider isolating WordPress instances or using security plugins that enforce stricter authorization checks on plugin actions. Regular backups and monitoring of email campaign logs can help detect and respond to abuse. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once available to fully remediate the vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce
Description
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
AI-Powered Analysis
Technical Analysis
CVE-2025-12348 identifies a missing authentication vulnerability (CWE-306) in the Icegram Express plugin for WordPress and WooCommerce, specifically in versions up to and including 5.9.10. The vulnerability exists in the run_action_scheduler_task function, which is responsible for executing scheduled actions such as sending emails, running maintenance tasks, or other privileged operations. Due to insufficient authorization checks, unauthenticated attackers can guess or enumerate action IDs and trigger these scheduled tasks prematurely or multiple times. This can cause unintended side effects including repeated email sends, manipulation of newsletter states, or excessive resource consumption on the server. The vulnerability is remotely exploitable over the network without any privileges or user interaction, with a CVSS 3.1 base score of 5.3 (medium severity). Although no public exploits have been reported, the flaw poses a risk to the integrity of marketing workflows and system stability. The plugin is widely used in WordPress environments for email marketing and newsletter management, making affected sites potential targets for abuse or denial-of-service conditions. No official patches have been linked yet, so mitigation relies on monitoring, restricting access, or disabling vulnerable functionality until updates are available.
Potential Impact
For European organizations, this vulnerability can disrupt critical marketing and communication workflows by allowing attackers to prematurely or repeatedly trigger email campaigns or maintenance tasks. This can lead to reputational damage due to spam or unintended email sends, increased operational costs from resource exhaustion, and potential loss of control over automated marketing processes. Organizations relying heavily on WordPress and WooCommerce for customer engagement, especially in sectors like retail, media, and services, may experience degraded service availability or customer trust issues. Furthermore, repeated or manipulated scheduled tasks could interfere with data integrity related to subscriber management. Although the vulnerability does not directly expose sensitive data, the integrity impact and potential denial-of-service effects pose a significant operational risk. Given the widespread use of WordPress in Europe, the threat surface is considerable, particularly for SMEs and enterprises using this plugin for email marketing automation.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the run_action_scheduler_task endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests targeting this function or guessing action IDs. Administrators should monitor logs for unusual or repeated calls to scheduled task endpoints and limit exposure by disabling or restricting the Icegram Express plugin if feasible. Employing rate limiting on relevant endpoints can reduce the risk of repeated exploitation. Until an official patch is released, organizations should consider isolating WordPress instances or using security plugins that enforce stricter authorization checks on plugin actions. Regular backups and monitoring of email campaign logs can help detect and respond to abuse. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once available to fully remediate the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T14:21:51.223Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693be422406b3dd4e02223ca
Added to database: 12/12/2025, 9:45:06 AM
Last enriched: 12/12/2025, 9:53:47 AM
Last updated: 12/14/2025, 10:41:50 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.