Home

Description

The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint.

PUBLISHED Reserved 2025-12-09 | Published 2026-02-21 | Updated 2026-02-21 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-24:Vendor Notified
2026-02-20:Disclosed

Credits

Angus Girvan finder

References

www.wordfence.com/...-3962-4c8e-993f-b6824c48ab76?source=cve

plugins.trac.wordpress.org/.../2.0.6/includes/Rest/Forms.php

plugins.trac.wordpress.org/.../includes/FrontEnd/Scripts.php

plugins.trac.wordpress.org/.../2.0.6/includes/Rest/Forms.php

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2025-14339)

nvd.nist.gov (CVE-2025-14339)

Download JSON