Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

0
Medium
VulnerabilityCVE-2025-12348cvecve-2025-12348cwe-306
Published: Fri Dec 12 2025 (12/12/2025, 09:20:29 UTC)
Source: CVE Database V5
Vendor/Project: icegram
Product: Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

Description

The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:21:12 UTC

Technical Analysis

CVE-2025-12348 is a Missing Authentication vulnerability (CWE-306) found in the Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress and WooCommerce. The vulnerability affects all versions up to and including 5.9.10. It arises because the plugin's run_action_scheduler_task function does not properly verify whether a user is authorized to execute scheduled actions. This lack of authorization checks allows unauthenticated attackers to guess action IDs and trigger scheduled tasks prematurely or multiple times. These tasks may include sending marketing emails, running maintenance routines, or other privileged operations that alter the plugin's state or consume server resources. The flaw does not expose confidential data directly but can lead to integrity issues by causing unexpected state changes and potential denial of service through resource exhaustion. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. No public exploits have been reported yet, but the risk exists for websites relying on this plugin for email marketing and notifications. The vulnerability highlights the importance of enforcing strict authorization checks on critical functions that can alter system state or trigger significant actions.

Potential Impact

The primary impact of CVE-2025-12348 is on the integrity of the affected systems. Attackers can manipulate scheduled tasks to send unauthorized emails, potentially spamming users or triggering unwanted notifications, which can damage brand reputation and user trust. Repeated or premature execution of maintenance tasks may cause unexpected system behavior or degrade performance due to resource exhaustion. Although confidentiality and availability are not directly impacted, the increased resource usage could indirectly affect availability if server resources are overwhelmed. Organizations relying on Icegram Express for critical marketing or notification workflows may experience operational disruptions or reputational harm. Additionally, unauthorized email sends could be leveraged for phishing or social engineering campaigns if attackers craft malicious content. The vulnerability's ease of exploitation without authentication raises the risk profile, especially for high-traffic WordPress sites using this plugin. Overall, the threat could lead to service degradation, user annoyance, and potential indirect security risks through misuse of email capabilities.

Mitigation Recommendations

1. Immediate upgrade: Organizations should update the Icegram Express plugin to the latest version once a patch is released that addresses this vulnerability. 2. Access restrictions: Until a patch is available, restrict access to the WordPress admin and plugin endpoints using web application firewall (WAF) rules or IP whitelisting to block unauthenticated requests targeting the run_action_scheduler_task function. 3. Monitor logs: Enable detailed logging of plugin-related actions and monitor for unusual or repeated execution of scheduled tasks that could indicate exploitation attempts. 4. Rate limiting: Implement rate limiting on requests to the affected plugin endpoints to reduce the risk of brute force guessing of action IDs. 5. Disable or limit scheduled tasks: If feasible, temporarily disable non-essential scheduled tasks or configure the plugin to require authentication for task execution. 6. Harden WordPress security: Enforce strong authentication, keep all plugins and themes updated, and use security plugins that can detect and block suspicious activity. 7. Incident response readiness: Prepare to respond to potential abuse such as spam campaigns or resource exhaustion by having mitigation plans and communication strategies in place. These targeted steps go beyond generic advice by focusing on immediate protective controls and monitoring specific to the vulnerability's exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T14:21:51.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693be422406b3dd4e02223ca

Added to database: 12/12/2025, 9:45:06 AM

Last enriched: 2/27/2026, 8:21:12 PM

Last updated: 3/26/2026, 4:21:18 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses