CVE-2025-66128: Missing Authorization in Brevo Sendinblue for WooCommerce
Missing Authorization vulnerability in Brevo Sendinblue for WooCommerce woocommerce-sendinblue-newsletter-subscription allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sendinblue for WooCommerce: from n/a through <= 4.0.49.
AI Analysis
Technical Summary
CVE-2025-66128 identifies a missing authorization vulnerability in the Brevo Sendinblue plugin for WooCommerce, specifically in the newsletter subscription module (woocommerce-sendinblue-newsletter-subscription). This vulnerability arises from incorrectly configured access control security levels, allowing unauthorized users to perform actions that should be restricted. The affected versions include all releases up to and including 4.0.49. The flaw means that an attacker could potentially manipulate subscription data, subscribe or unsubscribe users without permission, or interfere with the newsletter subscription process. Although no public exploits have been reported, the vulnerability's nature suggests that exploitation could be straightforward, as it does not require authentication or complex user interaction. The plugin is widely used in WooCommerce-based e-commerce sites to manage email marketing and customer engagement, making this a significant risk vector. The absence of a CVSS score indicates that the vulnerability is newly disclosed, with limited public technical details. However, the missing authorization issue directly impacts the integrity and confidentiality of user data and could disrupt service availability if abused at scale. The vulnerability was reserved and published in late 2025, with no patches currently linked, emphasizing the need for immediate attention from affected organizations.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce integrated with Brevo Sendinblue, this vulnerability poses a significant risk. Attackers exploiting this flaw could manipulate newsletter subscriptions, leading to unauthorized data access or modification, which compromises customer privacy and trust. This could result in regulatory non-compliance under GDPR due to unauthorized processing of personal data. Additionally, attackers might disrupt marketing campaigns or inject malicious content via newsletters, harming brand reputation and customer relationships. The potential for service disruption could affect business continuity, especially during peak sales periods. Given the widespread use of WooCommerce in Europe, the impact could be broad, affecting small to large enterprises relying on this plugin for customer engagement and communication.
Mitigation Recommendations
Organizations should immediately audit their use of the Brevo Sendinblue plugin for WooCommerce and restrict access to the newsletter subscription features to trusted administrators only. Until an official patch is released, consider disabling the plugin or the vulnerable subscription module to prevent exploitation. Implement web application firewall (WAF) rules to detect and block unauthorized access attempts targeting the plugin endpoints. Monitor logs for unusual subscription activity or unauthorized changes. Review and tighten WordPress and WooCommerce user roles and permissions to minimize exposure. Engage with the vendor for timely patch updates and apply them promptly once available. Additionally, conduct regular security assessments of all third-party plugins and maintain an inventory of installed components to quickly identify and remediate vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-66128: Missing Authorization in Brevo Sendinblue for WooCommerce
Description
Missing Authorization vulnerability in Brevo Sendinblue for WooCommerce woocommerce-sendinblue-newsletter-subscription allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Sendinblue for WooCommerce: from n/a through <= 4.0.49.
AI-Powered Analysis
Technical Analysis
CVE-2025-66128 identifies a missing authorization vulnerability in the Brevo Sendinblue plugin for WooCommerce, specifically in the newsletter subscription module (woocommerce-sendinblue-newsletter-subscription). This vulnerability arises from incorrectly configured access control security levels, allowing unauthorized users to perform actions that should be restricted. The affected versions include all releases up to and including 4.0.49. The flaw means that an attacker could potentially manipulate subscription data, subscribe or unsubscribe users without permission, or interfere with the newsletter subscription process. Although no public exploits have been reported, the vulnerability's nature suggests that exploitation could be straightforward, as it does not require authentication or complex user interaction. The plugin is widely used in WooCommerce-based e-commerce sites to manage email marketing and customer engagement, making this a significant risk vector. The absence of a CVSS score indicates that the vulnerability is newly disclosed, with limited public technical details. However, the missing authorization issue directly impacts the integrity and confidentiality of user data and could disrupt service availability if abused at scale. The vulnerability was reserved and published in late 2025, with no patches currently linked, emphasizing the need for immediate attention from affected organizations.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce integrated with Brevo Sendinblue, this vulnerability poses a significant risk. Attackers exploiting this flaw could manipulate newsletter subscriptions, leading to unauthorized data access or modification, which compromises customer privacy and trust. This could result in regulatory non-compliance under GDPR due to unauthorized processing of personal data. Additionally, attackers might disrupt marketing campaigns or inject malicious content via newsletters, harming brand reputation and customer relationships. The potential for service disruption could affect business continuity, especially during peak sales periods. Given the widespread use of WooCommerce in Europe, the impact could be broad, affecting small to large enterprises relying on this plugin for customer engagement and communication.
Mitigation Recommendations
Organizations should immediately audit their use of the Brevo Sendinblue plugin for WooCommerce and restrict access to the newsletter subscription features to trusted administrators only. Until an official patch is released, consider disabling the plugin or the vulnerable subscription module to prevent exploitation. Implement web application firewall (WAF) rules to detect and block unauthorized access attempts targeting the plugin endpoints. Monitor logs for unusual subscription activity or unauthorized changes. Review and tighten WordPress and WooCommerce user roles and permissions to minimize exposure. Engage with the vendor for timely patch updates and apply them promptly once available. Additionally, conduct regular security assessments of all third-party plugins and maintain an inventory of installed components to quickly identify and remediate vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:32.202Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411750594e45819d70c74d
Added to database: 12/16/2025, 8:24:48 AM
Last enriched: 12/16/2025, 8:41:32 AM
Last updated: 12/18/2025, 3:35:59 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.