Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13496: CWE-862 Missing Authorization in moosend Moosend Landing Pages

0
Medium
VulnerabilityCVE-2025-13496cvecve-2025-13496cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 08:21:55 UTC)
Source: CVE Database V5
Vendor/Project: moosend
Product: Moosend Landing Pages

Description

CVE-2025-13496 is a medium severity vulnerability in the Moosend Landing Pages WordPress plugin, affecting all versions up to 1. 1. 6. It arises from a missing authorization check in the moosend_landings_auth_get function, allowing authenticated users with Subscriber-level access or higher to delete the 'moosend_landing_api_key' option. This unauthorized modification can disrupt integration with Moosend services, potentially impacting marketing automation workflows. The vulnerability does not allow remote unauthenticated exploitation and does not affect confidentiality or availability directly but compromises integrity. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites should prioritize patching or restricting user roles to mitigate risk. Countries with high WordPress adoption and significant digital marketing activities, such as the UK, Germany, and France, are more likely to be affected. The vulnerability’s CVSS score is 5.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:36:14 UTC

Technical Analysis

CVE-2025-13496 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Moosend Landing Pages plugin for WordPress, affecting all versions up to and including 1.1.6. The root cause is the absence of a proper capability check in the moosend_landings_auth_get function, which is responsible for authorizing access to certain plugin functionalities. This flaw allows any authenticated user with Subscriber-level permissions or higher to delete the 'moosend_landing_api_key' stored in the WordPress options table. The API key is critical for the plugin’s integration with Moosend’s marketing automation services. By deleting this key, an attacker can disrupt the plugin’s ability to communicate with Moosend, effectively breaking marketing workflows or causing denial of service to those features. The vulnerability does not expose confidential data nor does it allow remote unauthenticated access, as it requires at least Subscriber-level authentication. The CVSS v3.1 score of 5.3 reflects a medium severity, with the vector indicating network attack vector, low attack complexity, no privileges required beyond Subscriber, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No public exploits have been reported to date, and no patches are currently linked, suggesting that mitigation may require manual updates or vendor intervention. The vulnerability was reserved in November 2025 and published in January 2026 by Wordfence.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of marketing automation workflows relying on the Moosend Landing Pages plugin. Unauthorized deletion of the API key compromises the integrity of the plugin’s configuration, potentially causing loss of functionality in lead capture, email marketing, and customer engagement processes. While this does not directly expose sensitive data or cause system downtime, the interruption of marketing operations can lead to financial losses, reduced customer engagement, and reputational damage. Organizations with multiple users having Subscriber-level access or higher are at increased risk, as internal threat actors or compromised accounts could exploit this vulnerability. Since the attack requires authenticated access, the risk is mitigated somewhat by strong access controls, but the medium severity rating indicates that the threat should not be ignored. The lack of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation. The impact is more pronounced for organizations heavily dependent on Moosend’s services integrated via this plugin, especially in sectors like e-commerce, digital marketing agencies, and media companies prevalent in Europe.

Mitigation Recommendations

To mitigate CVE-2025-13496, European organizations should first verify if they are using the Moosend Landing Pages plugin on their WordPress sites and identify the plugin version. Since no official patch links are currently available, organizations should monitor the vendor’s announcements for updates or patches. In the interim, restrict Subscriber-level and higher user permissions to trusted personnel only, minimizing the risk of unauthorized API key deletion. Implement role-based access controls (RBAC) and audit user activities related to plugin settings. Consider temporarily disabling the plugin if it is not critical or replacing it with alternative solutions that have proper authorization checks. Regularly back up WordPress configuration and database to enable quick restoration of the API key if deleted. Employ WordPress security plugins that can monitor and alert on changes to critical options or plugin configurations. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all users with access to the WordPress admin area to reduce the risk of account compromise. Finally, conduct security awareness training for users with elevated permissions to recognize and prevent misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-20T22:07:48.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb63e

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/14/2026, 3:36:14 PM

Last updated: 2/5/2026, 12:43:34 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats