Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP

0
Medium
VulnerabilityCVE-2025-14059cvecve-2025-14059cwe-73
Published: Wed Jan 07 2026 (01/07/2026, 03:21:03 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: EmailKit – Email Customizer for WooCommerce & WP

Description

CVE-2025-14059 is a medium severity vulnerability in the EmailKit plugin for WordPress, affecting all versions up to 1. 6. 1. It allows authenticated users with Author-level permissions or higher to perform arbitrary file reads on the server via a path traversal attack through the create_template REST API endpoint. The vulnerability arises because user input from the emailkit-editor-template parameter is passed unsanitized to file_get_contents(), enabling reading of sensitive files like /etc/passwd and wp-config. php. The contents of these files are stored in post meta and can be exfiltrated using the MetForm email confirmation feature. Exploitation does not require user interaction but does require authentication at a relatively low privilege level. There are no known exploits in the wild yet. This vulnerability poses a significant confidentiality risk to affected WordPress sites, especially those running WooCommerce with EmailKit.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:36:52 UTC

Technical Analysis

The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress contains a path traversal vulnerability (CWE-73) identified as CVE-2025-14059. This vulnerability exists in all versions up to and including 1.6.1 due to insufficient validation of the emailkit-editor-template parameter in the create_template REST API endpoint. Specifically, the plugin passes this user-controlled input directly to the PHP function file_get_contents() without sanitization or path normalization, allowing an authenticated user with Author-level permissions or higher to read arbitrary files on the server. This can include critical system files such as /etc/passwd or WordPress configuration files like wp-config.php, which may contain database credentials and secret keys. The retrieved file contents are stored within WordPress post meta data and can be exfiltrated through the MetForm plugin’s email confirmation feature, which can send this data via email. The attack vector requires network access to the WordPress REST API and valid credentials with at least Author privileges, but no additional user interaction is needed. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. No public exploit code or active exploitation has been reported yet. The root cause is the lack of path validation and sanitization, which is a common security oversight in file handling within web applications. This vulnerability highlights the risks of improper input handling in REST API endpoints and the importance of strict privilege management in WordPress environments.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized disclosure of sensitive server and application data, including credentials and configuration details, which could facilitate further attacks such as privilege escalation, lateral movement, or data breaches. Organizations running WooCommerce stores or other WordPress sites with EmailKit installed are at risk of confidential data leakage. This is particularly critical for e-commerce businesses handling personal and payment data under GDPR regulations, as exposure of configuration files could lead to compromise of customer data and regulatory penalties. The requirement for Author-level authentication lowers the barrier for exploitation, as many WordPress sites have multiple users with such privileges. The ability to exfiltrate data via email confirmation mechanisms also increases the risk of stealthy data theft. Although no integrity or availability impact is noted, the confidentiality breach alone can have severe reputational and financial consequences. The vulnerability could be exploited by insider threats or attackers who have compromised lower-privileged accounts. Given the widespread use of WordPress and WooCommerce across Europe, the potential attack surface is significant.

Mitigation Recommendations

Immediate mitigation steps include upgrading the EmailKit plugin to a patched version once available. Until a patch is released, organizations should restrict Author-level permissions to trusted users only and audit existing user roles to minimize exposure. Disabling or restricting access to the create_template REST API endpoint via web application firewalls or custom rules can reduce the attack surface. Implementing strict input validation and sanitization on the emailkit-editor-template parameter is critical to prevent path traversal. Monitoring and logging REST API requests for suspicious patterns related to file path manipulation can help detect exploitation attempts. Additionally, reviewing and limiting the use of the MetForm email confirmation feature or disabling it temporarily can prevent exfiltration of sensitive data. Organizations should also ensure that WordPress and all plugins are regularly updated and conduct security audits focusing on privilege management and plugin vulnerabilities. Employing file integrity monitoring on critical configuration files can alert administrators to unauthorized access or changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T19:21:34.885Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695dd93f873865b8635a453f

Added to database: 1/7/2026, 3:55:43 AM

Last enriched: 1/14/2026, 3:36:52 PM

Last updated: 2/4/2026, 12:53:22 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats