CVE-2025-14339
Plain English Summary
AI-powered analysis for quick understanding
An attacker can permanently delete all forms created with the weMail plugin on WordPress sites by exploiting a flaw that allows them to send a delete request using a nonce exposed in the page source, without needing to log in. This vulnerability affects all versions up to 2.0.7, and it means that anyone visiting the site can potentially wipe out important email marketing forms.
Technical Description
The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:LExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 21, 2026
about 2 months ago
Last Modified
Feb 23, 2026
about 2 months ago