Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14348: CWE-285 Improper Authorization in wedevs weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation

0
Medium
VulnerabilityCVE-2025-14348cvecve-2025-14348cwe-285
Published: Tue Jan 20 2026 (01/20/2026, 04:35:46 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation

Description

The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.0.7. This is due to the plugin's REST API trusting the `x-wemail-user` HTTP header to identify users without verifying the request originates from an authenticated WordPress session. This makes it possible for unauthenticated attackers who know or can guess an admin email (easily enumerable via `/wp-json/wp/v2/users`) to impersonate that user and access the CSV subscriber endpoints, potentially exfiltrating subscriber PII (emails, names, phone numbers) from imported CSV files.

AI-Powered Analysis

AILast updated: 01/20/2026, 05:05:31 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14348 affects the weMail plugin for WordPress, which provides email marketing, lead generation, opt-in forms, newsletters, A/B testing, and automation functionalities. The root cause is an improper authorization flaw (CWE-285) in the plugin's REST API, which relies solely on the x-wemail-user HTTP header to determine the user identity. This header can be arbitrarily set by an attacker, and the plugin fails to verify if the request originates from an authenticated WordPress session. Since WordPress exposes user information through the /wp-json/wp/v2/users endpoint, attackers can enumerate admin email addresses easily. Using this information, an unauthenticated attacker can craft requests impersonating an admin user and access sensitive subscriber data stored in CSV format, including personally identifiable information such as emails, names, and phone numbers. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, no required privileges, and no user interaction, but limited impact to confidentiality only and no impact on integrity or availability. No public exploits have been reported yet. The vulnerability affects all versions up to 2.0.7 of the plugin. Because the plugin is widely used in WordPress environments for marketing automation, the exposure of subscriber data can lead to privacy violations and compliance issues, especially under GDPR regulations in Europe.

Potential Impact

For European organizations, the impact of this vulnerability is significant due to the potential exposure of subscriber personally identifiable information (PII), including emails, names, and phone numbers. This can lead to privacy breaches and non-compliance with GDPR, resulting in regulatory fines and reputational damage. Organizations relying on the weMail plugin for customer engagement and marketing automation risk unauthorized data exfiltration by unauthenticated attackers. The breach of subscriber data can also facilitate phishing campaigns, identity theft, and other social engineering attacks targeting European customers or employees. Since the vulnerability does not affect system integrity or availability, the primary concern is confidentiality loss. The ease of exploitation (no authentication or user interaction required) increases the risk of widespread abuse, especially for organizations with publicly accessible WordPress REST APIs. Additionally, the exposure of admin email addresses through the WordPress REST API can further aid attackers in reconnaissance and targeted attacks.

Mitigation Recommendations

1. Immediately monitor and restrict access to the WordPress REST API endpoints, especially /wp-json/wp/v2/users, to prevent user enumeration by unauthenticated users. 2. Implement web application firewall (WAF) rules to detect and block suspicious requests containing the x-wemail-user header or attempts to access subscriber CSV endpoints without proper authentication. 3. Until an official patch is released, consider disabling or removing the weMail plugin if it is not critical to operations. 4. Apply the official security patch from the vendor as soon as it becomes available to ensure proper authorization checks are enforced in the REST API. 5. Conduct regular audits of subscriber data access logs to detect unusual or unauthorized access patterns. 6. Enforce least privilege principles for WordPress admin accounts and rotate admin emails if feasible to reduce the risk of enumeration. 7. Educate marketing and IT teams about the risks of exposing sensitive subscriber data and the importance of timely updates. 8. Review and enhance overall WordPress security posture, including strong authentication mechanisms and limiting plugin usage to trusted sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T15:13:36.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f09b14623b1157c16d2d9

Added to database: 1/20/2026, 4:50:57 AM

Last enriched: 1/20/2026, 5:05:31 AM

Last updated: 1/20/2026, 7:18:36 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats