CVE-2025-66128: Missing Authorization in Brevo Sendinblue for WooCommerce
Missing Authorization vulnerability in Brevo Sendinblue for WooCommerce woocommerce-sendinblue-newsletter-subscription allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sendinblue for WooCommerce: from n/a through <= 4.0.49.
AI Analysis
Technical Summary
CVE-2025-66128 identifies a Missing Authorization vulnerability in the Brevo Sendinblue plugin for WooCommerce, specifically in the woocommerce-sendinblue-newsletter-subscription component. This vulnerability arises from incorrectly configured access control security levels, allowing remote attackers to bypass authorization checks and perform actions that should be restricted. The affected versions include all releases up to and including 4.0.49. The vulnerability is exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, where unauthorized actors could potentially access or enumerate subscriber data or other sensitive information managed by the plugin. There is no impact on integrity or availability, meaning attackers cannot modify data or disrupt service. The vulnerability was reserved in November 2025 and published in December 2025, with no known exploits in the wild at the time of reporting. The lack of a patch link suggests that a fix may still be pending or recently released. This vulnerability is significant because Sendinblue is a widely used email marketing and newsletter subscription plugin integrated into WooCommerce, a popular e-commerce platform. Improper access control in such a plugin can lead to data leakage of customer email addresses and subscription statuses, which could be leveraged for phishing or spam campaigns. The technical root cause is an incorrect or missing authorization check in the plugin’s code, allowing unauthorized API or web requests to access or manipulate subscription data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of customer data managed through WooCommerce stores using the Sendinblue plugin. Exposure of subscriber lists or email addresses can lead to increased phishing attacks, spam, and reputational damage. While the vulnerability does not allow data modification or service disruption, the leakage of personal data could violate GDPR requirements, leading to regulatory penalties and loss of customer trust. E-commerce businesses relying on Sendinblue for marketing automation and customer engagement could see indirect impacts through compromised customer communications. The medium severity reflects the moderate risk: while exploitation is straightforward, the impact is limited to data exposure rather than full system compromise. Organizations with large customer bases or those in regulated sectors (e.g., finance, healthcare) may face higher consequences. Additionally, attackers could use exposed data as a foothold for further social engineering or targeted attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once the vulnerability becomes widely known.
Mitigation Recommendations
1. Monitor official Brevo/Sendinblue and WooCommerce channels for security patches addressing CVE-2025-66128 and apply updates immediately upon release. 2. Conduct a thorough audit of access control configurations within the Sendinblue plugin settings and WooCommerce integration to ensure no unauthorized access paths exist. 3. Restrict API and web endpoint access related to newsletter subscription management to trusted IP ranges or authenticated users where feasible. 4. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the Sendinblue plugin endpoints. 5. Review and limit the permissions of user roles within WooCommerce to minimize exposure from compromised accounts. 6. Monitor logs for unusual access patterns or attempts to exploit the subscription endpoints. 7. Educate staff about phishing risks stemming from potential data leaks and reinforce email security best practices. 8. Consider temporarily disabling the Sendinblue plugin if immediate patching is not possible and the risk is deemed unacceptable. 9. Ensure that data processing agreements and GDPR compliance measures are updated to reflect the risk and mitigation steps taken.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-66128: Missing Authorization in Brevo Sendinblue for WooCommerce
Description
Missing Authorization vulnerability in Brevo Sendinblue for WooCommerce woocommerce-sendinblue-newsletter-subscription allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sendinblue for WooCommerce: from n/a through <= 4.0.49.
AI-Powered Analysis
Technical Analysis
CVE-2025-66128 identifies a Missing Authorization vulnerability in the Brevo Sendinblue plugin for WooCommerce, specifically in the woocommerce-sendinblue-newsletter-subscription component. This vulnerability arises from incorrectly configured access control security levels, allowing remote attackers to bypass authorization checks and perform actions that should be restricted. The affected versions include all releases up to and including 4.0.49. The vulnerability is exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, where unauthorized actors could potentially access or enumerate subscriber data or other sensitive information managed by the plugin. There is no impact on integrity or availability, meaning attackers cannot modify data or disrupt service. The vulnerability was reserved in November 2025 and published in December 2025, with no known exploits in the wild at the time of reporting. The lack of a patch link suggests that a fix may still be pending or recently released. This vulnerability is significant because Sendinblue is a widely used email marketing and newsletter subscription plugin integrated into WooCommerce, a popular e-commerce platform. Improper access control in such a plugin can lead to data leakage of customer email addresses and subscription statuses, which could be leveraged for phishing or spam campaigns. The technical root cause is an incorrect or missing authorization check in the plugin’s code, allowing unauthorized API or web requests to access or manipulate subscription data.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality of customer data managed through WooCommerce stores using the Sendinblue plugin. Exposure of subscriber lists or email addresses can lead to increased phishing attacks, spam, and reputational damage. While the vulnerability does not allow data modification or service disruption, the leakage of personal data could violate GDPR requirements, leading to regulatory penalties and loss of customer trust. E-commerce businesses relying on Sendinblue for marketing automation and customer engagement could see indirect impacts through compromised customer communications. The medium severity reflects the moderate risk: while exploitation is straightforward, the impact is limited to data exposure rather than full system compromise. Organizations with large customer bases or those in regulated sectors (e.g., finance, healthcare) may face higher consequences. Additionally, attackers could use exposed data as a foothold for further social engineering or targeted attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once the vulnerability becomes widely known.
Mitigation Recommendations
1. Monitor official Brevo/Sendinblue and WooCommerce channels for security patches addressing CVE-2025-66128 and apply updates immediately upon release. 2. Conduct a thorough audit of access control configurations within the Sendinblue plugin settings and WooCommerce integration to ensure no unauthorized access paths exist. 3. Restrict API and web endpoint access related to newsletter subscription management to trusted IP ranges or authenticated users where feasible. 4. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the Sendinblue plugin endpoints. 5. Review and limit the permissions of user roles within WooCommerce to minimize exposure from compromised accounts. 6. Monitor logs for unusual access patterns or attempts to exploit the subscription endpoints. 7. Educate staff about phishing risks stemming from potential data leaks and reinforce email security best practices. 8. Consider temporarily disabling the Sendinblue plugin if immediate patching is not possible and the risk is deemed unacceptable. 9. Ensure that data processing agreements and GDPR compliance measures are updated to reflect the risk and mitigation steps taken.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:32.202Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411750594e45819d70c74d
Added to database: 12/16/2025, 8:24:48 AM
Last enriched: 1/21/2026, 12:33:31 AM
Last updated: 2/5/2026, 5:49:09 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
HighCVE-2025-70791: n/a
HighCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.