Vulnerability Description
The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wemail/tags/2.0.6/includes/FrontEnd/S
- https://plugins.trac.wordpress.org/browser/wemail/tags/2.0.6/includes/Rest/Forms
- https://plugins.trac.wordpress.org/browser/wemail/tags/2.0.6/includes/Rest/Forms
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new
- https://www.wordfence.com/threat-intel/vulnerabilities/id/16dd90c3-3962-4c8e-993
FAQ
What is CVE-2025-14339?
CVE-2025-14339 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and i...
How severe is CVE-2025-14339?
CVE-2025-14339 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-14339?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.