Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 06 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Yudiz Yudiz easy Email Subscription |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Yudiz Yudiz easy Email Subscription |
Thu, 06 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Easy Email Subscription plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the show_editsub_page() function. This makes it possible for unauthenticated attackers to delete arbitrary subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Easy Email Subscription <= 1.3 - Cross-Site Request Forgery to Arbitrary Subscriber Deletion | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-06T17:02:19.997Z
Reserved: 2025-09-18T14:54:06.118Z
Link: CVE-2025-10691
Updated: 2025-11-06T17:02:17.008Z
Status : Awaiting Analysis
Published: 2025-11-06T04:15:32.177
Modified: 2025-11-06T19:45:09.883
Link: CVE-2025-10691
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:06:44Z