CVE-2025-14339: CWE-862 Missing Authorization in wedevs weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins
CVE-2025-14339 is a missing authorization vulnerability in the weMail WordPress plugin up to version 2. 0. 7. The plugin improperly validates deletion requests for email marketing forms by only checking the REST nonce without verifying user capabilities. Because the nonce is exposed to unauthenticated visitors via JavaScript on pages with weMail forms, any unauthenticated attacker can extract it and send DELETE requests to permanently remove all forms. This results in loss of data integrity and availability of marketing forms without requiring authentication or user interaction. The vulnerability has a CVSS score of 6. 5 (medium severity) and currently no known exploits in the wild. Organizations using the weMail plugin are at risk of disruption to their email marketing operations if targeted.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14339 affects the weMail plugin for WordPress, which provides email marketing, automation, newsletters, and opt-in form functionalities. The root cause is a missing authorization check (CWE-862) in the Forms::permission() callback function. This function validates incoming DELETE requests to the forms REST API endpoint by verifying the presence of a valid REST nonce via the X-WP-Nonce header. However, it fails to check whether the requesting user has the necessary capabilities or permissions to delete forms. The REST nonce is exposed to unauthenticated visitors through the weMail JavaScript object embedded on pages containing weMail forms, allowing attackers to retrieve it from the page source. An attacker can then craft and send a DELETE HTTP request to the forms endpoint using the extracted nonce, bypassing authentication and authorization controls. This enables permanent deletion of all weMail forms, causing loss of data integrity and availability of critical marketing assets. The vulnerability affects all versions up to and including 2.0.7. The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but low integrity and high availability impacts. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and exploitable with minimal effort.
Potential Impact
This vulnerability can significantly disrupt organizations relying on the weMail plugin for their email marketing and lead generation activities. Unauthorized deletion of all marketing forms can result in loss of subscriber data collection capabilities, interruption of automated email campaigns, and degradation of customer engagement efforts. The integrity of marketing data is compromised as forms are deleted without authorization, and availability is impacted due to the inability to use or restore forms quickly. Organizations may face operational downtime, revenue loss from disrupted marketing workflows, and reputational damage if attackers exploit this flaw. Since no authentication or user interaction is needed, attackers can automate attacks at scale, potentially targeting multiple sites running vulnerable versions. Although confidentiality is not directly impacted, the loss of marketing infrastructure can indirectly affect business continuity and customer trust.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the weMail plugin to a version where proper authorization checks are implemented, once available from the vendor. Until a patch is released, administrators should consider disabling or restricting access to the weMail forms REST API endpoints via web application firewalls or server-level rules to block DELETE requests from unauthenticated sources. Removing or hiding the exposed REST nonce from public pages can reduce attack surface, though this may require custom code changes. Monitoring web server logs for suspicious DELETE requests targeting the forms endpoint can help detect exploitation attempts. Regular backups of form configurations and subscriber data should be maintained to enable rapid recovery if deletion occurs. Additionally, limiting plugin usage to trusted administrators and minimizing exposure of marketing pages to unauthenticated users can reduce risk. Organizations should also follow vendor advisories closely for patch releases and apply updates promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Japan, Netherlands
CVE-2025-14339: CWE-862 Missing Authorization in wedevs weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins
Description
CVE-2025-14339 is a missing authorization vulnerability in the weMail WordPress plugin up to version 2. 0. 7. The plugin improperly validates deletion requests for email marketing forms by only checking the REST nonce without verifying user capabilities. Because the nonce is exposed to unauthenticated visitors via JavaScript on pages with weMail forms, any unauthenticated attacker can extract it and send DELETE requests to permanently remove all forms. This results in loss of data integrity and availability of marketing forms without requiring authentication or user interaction. The vulnerability has a CVSS score of 6. 5 (medium severity) and currently no known exploits in the wild. Organizations using the weMail plugin are at risk of disruption to their email marketing operations if targeted.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14339 affects the weMail plugin for WordPress, which provides email marketing, automation, newsletters, and opt-in form functionalities. The root cause is a missing authorization check (CWE-862) in the Forms::permission() callback function. This function validates incoming DELETE requests to the forms REST API endpoint by verifying the presence of a valid REST nonce via the X-WP-Nonce header. However, it fails to check whether the requesting user has the necessary capabilities or permissions to delete forms. The REST nonce is exposed to unauthenticated visitors through the weMail JavaScript object embedded on pages containing weMail forms, allowing attackers to retrieve it from the page source. An attacker can then craft and send a DELETE HTTP request to the forms endpoint using the extracted nonce, bypassing authentication and authorization controls. This enables permanent deletion of all weMail forms, causing loss of data integrity and availability of critical marketing assets. The vulnerability affects all versions up to and including 2.0.7. The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but low integrity and high availability impacts. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and exploitable with minimal effort.
Potential Impact
This vulnerability can significantly disrupt organizations relying on the weMail plugin for their email marketing and lead generation activities. Unauthorized deletion of all marketing forms can result in loss of subscriber data collection capabilities, interruption of automated email campaigns, and degradation of customer engagement efforts. The integrity of marketing data is compromised as forms are deleted without authorization, and availability is impacted due to the inability to use or restore forms quickly. Organizations may face operational downtime, revenue loss from disrupted marketing workflows, and reputational damage if attackers exploit this flaw. Since no authentication or user interaction is needed, attackers can automate attacks at scale, potentially targeting multiple sites running vulnerable versions. Although confidentiality is not directly impacted, the loss of marketing infrastructure can indirectly affect business continuity and customer trust.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade the weMail plugin to a version where proper authorization checks are implemented, once available from the vendor. Until a patch is released, administrators should consider disabling or restricting access to the weMail forms REST API endpoints via web application firewalls or server-level rules to block DELETE requests from unauthenticated sources. Removing or hiding the exposed REST nonce from public pages can reduce attack surface, though this may require custom code changes. Monitoring web server logs for suspicious DELETE requests targeting the forms endpoint can help detect exploitation attempts. Regular backups of form configurations and subscriber data should be maintained to enable rapid recovery if deletion occurs. Additionally, limiting plugin usage to trusted administrators and minimizing exposure of marketing pages to unauthenticated users can reduce risk. Organizations should also follow vendor advisories closely for patch releases and apply updates promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-09T14:06:01.519Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69997b9dbe58cf853b7530da
Added to database: 2/21/2026, 9:32:13 AM
Last enriched: 2/21/2026, 9:46:42 AM
Last updated: 2/21/2026, 12:34:36 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1787: CWE-862 Missing Authorization in thimpress LearnPress – Backup & Migration Tool
MediumCVE-2026-27579: CWE-346: Origin Validation Error in karnop realtime-collaboration-platform
HighCVE-2026-27492: CWE-488: Exposure of Data Element to Wrong Session in lettermint lettermint-node
MediumCVE-2026-27482: CWE-396: Declaration of Catch for Generic Exception in ray-project ray
MediumCVE-2026-27479: CWE-918: Server-Side Request Forgery (SSRF) in ellite Wallos
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.