Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wedevs
Wedevs wemail: Email Marketing, Email Automation, Newsletters, Subscribers & Ecommerce Email Optins Wordpress Wordpress wordpress |
|
| Vendors & Products |
Wedevs
Wedevs wemail: Email Marketing, Email Automation, Newsletters, Subscribers & Ecommerce Email Optins Wordpress Wordpress wordpress |
Sat, 21 Feb 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint. | |
| Title | weMail <= 2.0.7 - Missing Authorization to Unauthenticated Form Deletion | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-25T21:18:46.447Z
Reserved: 2025-12-09T14:06:01.519Z
Link: CVE-2025-14339
Updated: 2026-02-25T21:18:41.520Z
Status : Awaiting Analysis
Published: 2026-02-21T10:16:11.133
Modified: 2026-02-23T18:13:53.397
Link: CVE-2025-14339
No data.
OpenCVE Enrichment
Updated: 2026-02-23T14:32:09Z