Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anilankola
Anilankola newsletter Email Subscribe Wordpress Wordpress wordpress |
|
| Vendors & Products |
Anilankola
Anilankola newsletter Email Subscribe Wordpress Wordpress wordpress |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Newsletter Email Subscribe plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4. This is due to incorrect nonce validation on the nels_settings_page function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |
| Title | Newsletter Email Subscribe <= 2.4 - Cross-Site Request Forgery to Plugin Settings Update | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-07T16:14:36.024Z
Reserved: 2025-12-18T18:04:39.071Z
Link: CVE-2025-14904
Updated: 2026-01-07T14:52:55.842Z
Status : Awaiting Analysis
Published: 2026-01-07T12:16:58.097
Modified: 2026-01-08T18:08:54.147
Link: CVE-2025-14904
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:49:36Z