Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14339: CWE-862 Missing Authorization in wedevs weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins

0
Medium
VulnerabilityCVE-2025-14339cvecve-2025-14339cwe-862
Published: Sat Feb 21 2026 (02/21/2026, 09:27:59 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins

Description

CVE-2025-14339 is a missing authorization vulnerability in the weMail WordPress plugin up to version 2. 0. 7. The plugin improperly validates deletion requests for email marketing forms by only checking the REST nonce without verifying user capabilities. Because the nonce is exposed to unauthenticated visitors via JavaScript on pages with weMail forms, any unauthenticated attacker can extract it and send DELETE requests to permanently remove all forms. This results in loss of data integrity and availability of marketing forms without requiring authentication or user interaction. The vulnerability has a CVSS score of 6. 5 (medium severity) and currently no known exploits in the wild. Organizations using the weMail plugin are at risk of disruption to their email marketing operations if targeted.

AI-Powered Analysis

AILast updated: 02/21/2026, 09:46:42 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14339 affects the weMail plugin for WordPress, which provides email marketing, automation, newsletters, and opt-in form functionalities. The root cause is a missing authorization check (CWE-862) in the Forms::permission() callback function. This function validates incoming DELETE requests to the forms REST API endpoint by verifying the presence of a valid REST nonce via the X-WP-Nonce header. However, it fails to check whether the requesting user has the necessary capabilities or permissions to delete forms. The REST nonce is exposed to unauthenticated visitors through the weMail JavaScript object embedded on pages containing weMail forms, allowing attackers to retrieve it from the page source. An attacker can then craft and send a DELETE HTTP request to the forms endpoint using the extracted nonce, bypassing authentication and authorization controls. This enables permanent deletion of all weMail forms, causing loss of data integrity and availability of critical marketing assets. The vulnerability affects all versions up to and including 2.0.7. The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, but low integrity and high availability impacts. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and exploitable with minimal effort.

Potential Impact

This vulnerability can significantly disrupt organizations relying on the weMail plugin for their email marketing and lead generation activities. Unauthorized deletion of all marketing forms can result in loss of subscriber data collection capabilities, interruption of automated email campaigns, and degradation of customer engagement efforts. The integrity of marketing data is compromised as forms are deleted without authorization, and availability is impacted due to the inability to use or restore forms quickly. Organizations may face operational downtime, revenue loss from disrupted marketing workflows, and reputational damage if attackers exploit this flaw. Since no authentication or user interaction is needed, attackers can automate attacks at scale, potentially targeting multiple sites running vulnerable versions. Although confidentiality is not directly impacted, the loss of marketing infrastructure can indirectly affect business continuity and customer trust.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade the weMail plugin to a version where proper authorization checks are implemented, once available from the vendor. Until a patch is released, administrators should consider disabling or restricting access to the weMail forms REST API endpoints via web application firewalls or server-level rules to block DELETE requests from unauthenticated sources. Removing or hiding the exposed REST nonce from public pages can reduce attack surface, though this may require custom code changes. Monitoring web server logs for suspicious DELETE requests targeting the forms endpoint can help detect exploitation attempts. Regular backups of form configurations and subscriber data should be maintained to enable rapid recovery if deletion occurs. Additionally, limiting plugin usage to trusted administrators and minimizing exposure of marketing pages to unauthenticated users can reduce risk. Organizations should also follow vendor advisories closely for patch releases and apply updates promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T14:06:01.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69997b9dbe58cf853b7530da

Added to database: 2/21/2026, 9:32:13 AM

Last enriched: 2/21/2026, 9:46:42 AM

Last updated: 2/21/2026, 12:34:36 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats