Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

0
Medium
VulnerabilityCVE-2025-12348cvecve-2025-12348cwe-306
Published: Fri Dec 12 2025 (12/12/2025, 09:20:29 UTC)
Source: CVE Database V5
Vendor/Project: icegram
Product: Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce

Description

The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.

AI-Powered Analysis

AILast updated: 12/19/2025, 11:18:58 UTC

Technical Analysis

CVE-2025-12348 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Icegram Express plugin for WordPress and WooCommerce, specifically versions up to and including 5.9.10. The vulnerability arises because the plugin's run_action_scheduler_task function does not properly verify whether a user is authorized to execute scheduled actions. This lack of authentication allows unauthenticated attackers to guess valid action IDs and trigger scheduled tasks prematurely or multiple times. These tasks can include sending marketing emails, running maintenance routines, or other privileged operations that the plugin schedules. Exploitation of this flaw can lead to unintended state changes within the plugin's operation, such as repeated email blasts or excessive resource consumption on the hosting server. Although the vulnerability does not expose sensitive data or directly cause denial of service, it undermines the integrity of the plugin's scheduled functions and can disrupt normal marketing and notification workflows. The vulnerability is remotely exploitable without any user interaction or privileges, increasing its risk profile. No patches or fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 score is 5.3, indicating a medium severity level primarily due to the lack of authentication combined with limited impact on confidentiality and availability.

Potential Impact

For European organizations using WordPress sites with the Icegram Express plugin, this vulnerability can lead to unauthorized triggering of scheduled marketing emails or maintenance tasks. This may result in spam-like email floods, damaging the organization's reputation and potentially causing blacklisting by email providers. Additionally, repeated execution of resource-intensive tasks could degrade website performance or increase hosting costs. While no direct data breach is implied, the integrity of marketing communications and operational stability is at risk. Organizations relying heavily on automated email marketing or notifications may experience workflow disruptions, impacting customer engagement and business operations. The vulnerability could also be leveraged as part of a broader attack chain to create distractions or resource exhaustion. Given the widespread use of WordPress and WooCommerce in Europe, especially among SMEs and e-commerce businesses, the impact could be significant if exploited at scale.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the Icegram Express plugin, particularly versions up to 5.9.10. Since no official patch links are provided, administrators should monitor vendor announcements for updates and apply patches as soon as they become available. In the interim, restrict access to the plugin's scheduled task endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the run_action_scheduler_task function or related URLs. Employ rate limiting to prevent brute-force guessing of action IDs. Review and harden WordPress user roles and permissions to minimize exposure. Consider disabling or limiting the plugin's scheduling features if not critical. Regularly audit scheduled tasks and logs for unusual activity indicative of exploitation attempts. Additionally, ensure that email sending limits and spam protections are in place to mitigate potential abuse. Finally, maintain up-to-date backups and incident response plans to quickly recover from any disruptions caused by exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T14:21:51.223Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693be422406b3dd4e02223ca

Added to database: 12/12/2025, 9:45:06 AM

Last enriched: 12/19/2025, 11:18:58 AM

Last updated: 2/7/2026, 1:59:15 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats