Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67948: Exposure of Sensitive System Information to an Unauthorized Control Sphere in SendPulse SendPulse Email Marketing Newsletter

0
Medium
VulnerabilityCVE-2025-67948cvecve-2025-67948
Published: Tue Dec 16 2025 (12/16/2025, 08:12:57 UTC)
Source: CVE Database V5
Vendor/Project: SendPulse
Product: SendPulse Email Marketing Newsletter

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in SendPulse SendPulse Email Marketing Newsletter sendpulse-email-marketing-newsletter allows Retrieve Embedded Sensitive Data.This issue affects SendPulse Email Marketing Newsletter: from n/a through <= 2.2.1.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:12:39 UTC

Technical Analysis

CVE-2025-67948 is a vulnerability identified in the SendPulse Email Marketing Newsletter product, affecting versions up to and including 2.2.1. The issue involves the exposure of sensitive system information to unauthorized control spheres, meaning that an attacker with limited privileges can retrieve embedded sensitive data from the system. The vulnerability is remotely exploitable (AV:N), requires low attack complexity (AC:L), and needs privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to confidentiality (C:L), with no impact on integrity or availability. This suggests that while the attacker cannot modify or disrupt system operations, they can gain access to sensitive information that could facilitate further attacks or data breaches. The vulnerability was reserved and published in December 2025, with no known exploits in the wild or patches currently linked. The lack of patches indicates that organizations must be vigilant and prepare to apply fixes once released. The vulnerability likely arises from improper access controls or information disclosure flaws within the SendPulse Email Marketing Newsletter system, allowing unauthorized retrieval of embedded sensitive data. Given the nature of email marketing platforms, the exposed data could include configuration details, API keys, or user information, which could be leveraged for phishing, account takeover, or lateral movement within networks.

Potential Impact

For European organizations, the exposure of sensitive system information can have significant repercussions, especially given stringent data protection regulations such as GDPR. Leakage of configuration data or credentials could lead to unauthorized access to marketing campaigns, customer data, or internal systems, resulting in reputational damage, regulatory fines, and operational disruptions. Marketing and communication teams relying on SendPulse could face compromised campaign integrity or data breaches affecting their customers. Since the vulnerability requires only limited privileges and no user interaction, insider threats or compromised accounts could easily exploit it remotely. The medium severity rating reflects that while the vulnerability does not directly impact system availability or integrity, the confidentiality breach could be a stepping stone for more severe attacks. Organizations in sectors with high privacy requirements, such as finance, healthcare, and telecommunications, may be particularly vulnerable to the cascading effects of such information exposure.

Mitigation Recommendations

1. Monitor SendPulse vendor communications closely for official patches addressing CVE-2025-67948 and apply updates immediately upon release. 2. Restrict network access to SendPulse Email Marketing Newsletter management interfaces and APIs to trusted IP ranges and authenticated users only. 3. Implement strict role-based access controls (RBAC) to limit privileges and reduce the risk of exploitation by low-privilege users. 4. Conduct regular audits of system logs and access patterns to detect anomalous retrieval of sensitive data. 5. Employ network segmentation to isolate marketing platforms from critical internal systems to contain potential breaches. 6. Review and rotate any exposed credentials or API keys associated with SendPulse integrations. 7. Educate internal teams about the risks of information exposure and encourage reporting of suspicious activity. 8. Consider deploying web application firewalls (WAF) with custom rules to detect and block attempts to exploit this vulnerability before patches are available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:06.385Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411753594e45819d70ccc1

Added to database: 12/16/2025, 8:24:51 AM

Last enriched: 1/21/2026, 1:12:39 AM

Last updated: 2/4/2026, 10:39:53 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats