Skip to main content

CVE-2025-28985: CWE-862 Missing Authorization in Elastic Email Elastic Email Subscribe Form

Low
VulnerabilityCVE-2025-28985cvecve-2025-28985cwe-862
Published: Fri Jun 06 2025 (06/06/2025, 12:54:30 UTC)
Source: CVE Database V5
Vendor/Project: Elastic Email
Product: Elastic Email Subscribe Form

Description

Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elastic Email Subscribe Form: from n/a through 1.2.2.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:10:03 UTC

Technical Analysis

CVE-2025-28985 is a Missing Authorization vulnerability (CWE-862) found in the Elastic Email Subscribe Form, a component of the Elastic Email platform used for managing email subscriptions. This vulnerability arises from incorrectly configured access control security levels, allowing unauthorized users with some level of privileges (PR:L - Privileges Required: Low) to exploit the system without proper authorization checks. The vulnerability affects versions up to 1.2.2, though exact affected versions are not fully specified (noted as 'n/a'). The CVSS 3.1 base score is 5.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact affects integrity and availability (I:L, A:L) but not confidentiality (C:N). Specifically, an attacker with low privileges can manipulate subscription form operations, potentially altering subscription data or causing denial of service conditions. No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is significant because subscription forms are often publicly accessible and integral to marketing and communication workflows, and improper authorization can lead to data manipulation or service disruption.

Potential Impact

For European organizations using Elastic Email Subscribe Form, this vulnerability could lead to unauthorized modification of subscription data, such as adding or removing subscribers without consent, which may disrupt marketing campaigns and customer communications. The integrity of subscriber lists could be compromised, leading to loss of trust and potential regulatory issues under GDPR if subscriber data is mishandled. Availability impacts could result in denial of service to legitimate users attempting to subscribe or unsubscribe, affecting business operations and customer engagement. Since the vulnerability does not impact confidentiality directly, data leakage risk is lower, but the manipulation of subscription data and service disruption can have significant operational and reputational consequences. Organizations relying heavily on email marketing and customer outreach in Europe should be particularly cautious, as disruptions could affect customer retention and compliance with data protection regulations.

Mitigation Recommendations

Organizations should immediately review and tighten access control configurations on the Elastic Email Subscribe Form to ensure proper authorization checks are enforced. This includes verifying that only authorized users or systems can perform subscription management operations. Implement role-based access controls (RBAC) with the principle of least privilege to restrict access to subscription form management features. Monitor logs for unusual subscription activity that could indicate exploitation attempts. Since no patches are currently linked, organizations should engage with Elastic Email support or vendor channels to obtain updates or workarounds. Additionally, consider implementing web application firewalls (WAF) rules to detect and block unauthorized requests targeting subscription endpoints. Regularly audit and test the subscription form's access controls as part of security assessments. Finally, ensure that backup and recovery procedures are in place to restore subscription data integrity in case of manipulation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:44.966Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842edda71f4d251b5c87f56

Added to database: 6/6/2025, 1:32:10 PM

Last enriched: 7/8/2025, 8:10:03 AM

Last updated: 8/12/2025, 5:56:09 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats