Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14348: CWE-285 Improper Authorization in wedevs weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation

0
Medium
VulnerabilityCVE-2025-14348cvecve-2025-14348cwe-285
Published: Tue Jan 20 2026 (01/20/2026, 04:35:46 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation

Description

The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.0.7. This is due to the plugin's REST API trusting the `x-wemail-user` HTTP header to identify users without verifying the request originates from an authenticated WordPress session. This makes it possible for unauthenticated attackers who know or can guess an admin email (easily enumerable via `/wp-json/wp/v2/users`) to impersonate that user and access the CSV subscriber endpoints, potentially exfiltrating subscriber PII (emails, names, phone numbers) from imported CSV files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:06:07 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14348 affects the weMail WordPress plugin, a tool widely used for email marketing, lead generation, and automation. The root cause is an improper authorization flaw (CWE-285) in the plugin's REST API, which relies on the 'x-wemail-user' HTTP header to determine user identity without validating that the request originates from an authenticated WordPress session. This design flaw allows unauthenticated attackers to spoof the header and impersonate any user, including administrators. Attackers can enumerate valid admin email addresses through the publicly accessible WordPress REST API endpoint '/wp-json/wp/v2/users', which exposes usernames and emails. By exploiting this, attackers gain unauthorized access to CSV subscriber endpoints, enabling them to exfiltrate sensitive subscriber data such as emails, names, and phone numbers imported into the plugin. The vulnerability affects all versions up to and including 2.0.7, with no patch currently available. The CVSS 3.1 base score is 5.3, reflecting medium severity due to the confidentiality impact and ease of exploitation without authentication or user interaction. There are no known exploits in the wild yet, but the vulnerability poses a significant privacy risk to organizations relying on weMail for subscriber management.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of personally identifiable information (PII) of subscribers managed through the weMail plugin. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage for affected organizations. Attackers can harvest large volumes of subscriber data, which could be used for phishing campaigns, identity theft, or further targeted attacks. Since the vulnerability does not affect data integrity or availability, the risk is confined to confidentiality breaches. However, given the sensitive nature of subscriber data, the impact on organizations handling marketing and customer engagement is significant. The ease of exploitation without authentication increases the likelihood of attacks, especially against websites with publicly accessible REST APIs. Organizations with large subscriber bases or operating in regulated industries face heightened risks.

Mitigation Recommendations

Organizations should immediately verify the version of the weMail plugin installed and upgrade to a patched version once available. Until a patch is released, restrict access to the WordPress REST API endpoints related to weMail by implementing IP whitelisting, web application firewall (WAF) rules, or authentication enforcement. Disable or limit the exposure of the '/wp-json/wp/v2/users' endpoint to prevent enumeration of admin emails, for example by using plugins that restrict REST API access or custom code to filter responses. Monitor web server logs for suspicious requests containing the 'x-wemail-user' header or unusual access patterns to subscriber CSV endpoints. Educate administrators to avoid exposing sensitive data unnecessarily and review subscriber data handling policies. Consider implementing additional layers of authentication or token validation for REST API requests in the interim. Regularly audit WordPress plugins for security updates and vulnerabilities to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T15:13:36.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f09b14623b1157c16d2d9

Added to database: 1/20/2026, 4:50:57 AM

Last enriched: 2/27/2026, 11:06:07 AM

Last updated: 3/24/2026, 12:14:18 AM

Views: 102

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses