CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
AI Analysis
Technical Summary
CVE-2025-12348 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Icegram Express plugin for WordPress and WooCommerce, specifically versions up to and including 5.9.10. The vulnerability arises because the plugin's run_action_scheduler_task function does not properly verify whether a user is authorized to execute scheduled actions. This lack of authentication allows unauthenticated attackers to guess valid action IDs and trigger scheduled tasks prematurely or multiple times. These tasks can include sending marketing emails, running maintenance routines, or other privileged operations that the plugin schedules. Exploitation of this flaw can lead to unintended state changes within the plugin's operation, such as repeated email blasts or excessive resource consumption on the hosting server. Although the vulnerability does not expose sensitive data or directly cause denial of service, it undermines the integrity of the plugin's scheduled functions and can disrupt normal marketing and notification workflows. The vulnerability is remotely exploitable without any user interaction or privileges, increasing its risk profile. No patches or fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 score is 5.3, indicating a medium severity level primarily due to the lack of authentication combined with limited impact on confidentiality and availability.
Potential Impact
For European organizations using WordPress sites with the Icegram Express plugin, this vulnerability can lead to unauthorized triggering of scheduled marketing emails or maintenance tasks. This may result in spam-like email floods, damaging the organization's reputation and potentially causing blacklisting by email providers. Additionally, repeated execution of resource-intensive tasks could degrade website performance or increase hosting costs. While no direct data breach is implied, the integrity of marketing communications and operational stability is at risk. Organizations relying heavily on automated email marketing or notifications may experience workflow disruptions, impacting customer engagement and business operations. The vulnerability could also be leveraged as part of a broader attack chain to create distractions or resource exhaustion. Given the widespread use of WordPress and WooCommerce in Europe, especially among SMEs and e-commerce businesses, the impact could be significant if exploited at scale.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Icegram Express plugin, particularly versions up to 5.9.10. Since no official patch links are provided, administrators should monitor vendor announcements for updates and apply patches as soon as they become available. In the interim, restrict access to the plugin's scheduled task endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the run_action_scheduler_task function or related URLs. Employ rate limiting to prevent brute-force guessing of action IDs. Review and harden WordPress user roles and permissions to minimize exposure. Consider disabling or limiting the plugin's scheduling features if not critical. Regularly audit scheduled tasks and logs for unusual activity indicative of exploitation attempts. Additionally, ensure that email sending limits and spam protections are in place to mitigate potential abuse. Finally, maintain up-to-date backups and incident response plans to quickly recover from any disruptions caused by exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12348: CWE-306 Missing Authentication for Critical Function in icegram Email Subscribers & Newsletters – Powerful Email Marketing, Post Notification & Newsletter Plugin for WordPress & WooCommerce
Description
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.
AI-Powered Analysis
Technical Analysis
CVE-2025-12348 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Icegram Express plugin for WordPress and WooCommerce, specifically versions up to and including 5.9.10. The vulnerability arises because the plugin's run_action_scheduler_task function does not properly verify whether a user is authorized to execute scheduled actions. This lack of authentication allows unauthenticated attackers to guess valid action IDs and trigger scheduled tasks prematurely or multiple times. These tasks can include sending marketing emails, running maintenance routines, or other privileged operations that the plugin schedules. Exploitation of this flaw can lead to unintended state changes within the plugin's operation, such as repeated email blasts or excessive resource consumption on the hosting server. Although the vulnerability does not expose sensitive data or directly cause denial of service, it undermines the integrity of the plugin's scheduled functions and can disrupt normal marketing and notification workflows. The vulnerability is remotely exploitable without any user interaction or privileges, increasing its risk profile. No patches or fixes are currently linked, and no active exploitation has been reported. The CVSS v3.1 score is 5.3, indicating a medium severity level primarily due to the lack of authentication combined with limited impact on confidentiality and availability.
Potential Impact
For European organizations using WordPress sites with the Icegram Express plugin, this vulnerability can lead to unauthorized triggering of scheduled marketing emails or maintenance tasks. This may result in spam-like email floods, damaging the organization's reputation and potentially causing blacklisting by email providers. Additionally, repeated execution of resource-intensive tasks could degrade website performance or increase hosting costs. While no direct data breach is implied, the integrity of marketing communications and operational stability is at risk. Organizations relying heavily on automated email marketing or notifications may experience workflow disruptions, impacting customer engagement and business operations. The vulnerability could also be leveraged as part of a broader attack chain to create distractions or resource exhaustion. Given the widespread use of WordPress and WooCommerce in Europe, especially among SMEs and e-commerce businesses, the impact could be significant if exploited at scale.
Mitigation Recommendations
European organizations should immediately verify if their WordPress installations use the Icegram Express plugin, particularly versions up to 5.9.10. Since no official patch links are provided, administrators should monitor vendor announcements for updates and apply patches as soon as they become available. In the interim, restrict access to the plugin's scheduled task endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests targeting the run_action_scheduler_task function or related URLs. Employ rate limiting to prevent brute-force guessing of action IDs. Review and harden WordPress user roles and permissions to minimize exposure. Consider disabling or limiting the plugin's scheduling features if not critical. Regularly audit scheduled tasks and logs for unusual activity indicative of exploitation attempts. Additionally, ensure that email sending limits and spam protections are in place to mitigate potential abuse. Finally, maintain up-to-date backups and incident response plans to quickly recover from any disruptions caused by exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-27T14:21:51.223Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693be422406b3dd4e02223ca
Added to database: 12/12/2025, 9:45:06 AM
Last enriched: 12/19/2025, 11:18:58 AM
Last updated: 2/7/2026, 1:59:15 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.