CVE-2025-14339

Plain English Summary

AI-powered analysis for quick understanding

An attacker can permanently delete all forms created with the weMail plugin on WordPress sites by exploiting a flaw that allows them to send a delete request using a nonce exposed in the page source, without needing to log in. This vulnerability affects all versions up to 2.0.7, and it means that anyone visiting the site can potentially wipe out important email marketing forms.

Technical Description

The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$931($500-$1K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 21, 2026

about 2 months ago

Last Modified

Feb 23, 2026

about 2 months ago