Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13496: CWE-862 Missing Authorization in moosend Moosend Landing Pages

0
Medium
VulnerabilityCVE-2025-13496cvecve-2025-13496cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 08:21:55 UTC)
Source: CVE Database V5
Vendor/Project: moosend
Product: Moosend Landing Pages

Description

The Moosend Landing Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the moosend_landings_auth_get function in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the 'moosend_landing_api_key' option value.

AI-Powered Analysis

AILast updated: 01/07/2026, 08:54:24 UTC

Technical Analysis

CVE-2025-13496 identifies a missing authorization vulnerability (CWE-862) in the Moosend Landing Pages plugin for WordPress, affecting all versions up to and including 1.1.6. The vulnerability arises because the moosend_landings_auth_get function does not perform a capability check before allowing modification of the 'moosend_landing_api_key' option. This omission permits any authenticated user with Subscriber-level access or higher to delete this critical API key, which is used for integration with Moosend's marketing automation services. The attack vector is remote network-based (AV:N), requires low attack complexity (AC:L), and no privileges (PR:N) or user interaction (UI:N) beyond being logged in as a Subscriber or above. The impact is limited to integrity (I:L) with no direct confidentiality or availability effects. Deleting the API key could disrupt marketing automation processes, causing operational issues for organizations relying on Moosend services. Although no exploits are currently known in the wild, the vulnerability represents a risk to organizations using this plugin, especially those with multiple users having Subscriber or higher roles. The vulnerability was published on January 7, 2026, and no patches are currently linked, indicating that mitigation may require manual intervention or plugin updates once available.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized deletion of the Moosend API key, disrupting marketing automation workflows and potentially causing loss of marketing data synchronization. While it does not directly expose sensitive data or cause system downtime, the integrity compromise can lead to operational inefficiencies and loss of business continuity in marketing campaigns. Organizations with multiple users assigned Subscriber or higher roles are at increased risk, as any such user could exploit this flaw. This is particularly impactful for companies heavily reliant on Moosend for customer engagement and lead generation. The disruption could also affect customer experience and revenue generation. Additionally, the lack of proper authorization checks may indicate broader security weaknesses in the plugin, warranting a thorough security review. The medium severity suggests that while the threat is not critical, it should be addressed promptly to avoid potential exploitation.

Mitigation Recommendations

1. Immediately restrict Subscriber-level user permissions to only trusted individuals until a patch is available. 2. Monitor and audit user activities related to the Moosend plugin settings to detect unauthorized changes. 3. Implement a Web Application Firewall (WAF) rule to detect and block suspicious requests targeting the moosend_landings_auth_get function. 4. Regularly back up WordPress configuration and plugin settings, including the 'moosend_landing_api_key', to enable quick restoration if deletion occurs. 5. Contact the plugin vendor for updates or patches and apply them as soon as they are released. 6. Consider temporarily disabling the Moosend Landing Pages plugin if the risk outweighs the operational need until a secure version is available. 7. Educate users with Subscriber or higher roles on the risks and enforce strict access control policies. 8. Review and harden WordPress user role assignments to minimize unnecessary privileges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-20T22:07:48.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb63e

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/7/2026, 8:54:24 AM

Last updated: 1/8/2026, 6:00:05 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats