Description
Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form elastic-email-subscribe-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elastic Email Subscribe Form: from n/a through <= 1.2.2.
Published: 2025-06-06
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Elastic Email Subscribe Form WordPress plugin contains a missing authorization check that allows users with incorrect access control configuration to exploit plugin features. This represents a broken access control vulnerability. An attacker could potentially use the plugin's exposed functionality to perform unauthorized actions such as adding subscribers, viewing subscription data, or modifying plugin configuration. The lack of proper authorization checks could lead to privacy leakage or unauthorized data manipulation. The vulnerability is classified as CWE‑862, indicating an authority bypass.

Affected Systems

The vulnerability affects the Elastic Email Subscribe Form plugin for WordPress, specifically all versions from the earliest release through version 1.2.2. Users running any of these versions are at risk. The plugin is distributed by Elastic Email and is commonly installed on WordPress sites that provide email subscription services. The issue does not affect the core WordPress software itself, only the plugin.

Risk and Exploitability

The CVSS score is 5.4, placing the vulnerability in the medium severity range. The EPSS score is below 1%, indicating a very low probability of exploitation at the time of assessment. The vulnerability is not listed in CISA KEV. The attack vector is most likely via the plugin's exposed endpoints, which can be accessed by any authenticated user or, depending on configuration, even anonymous users. Because the plugin lacks proper access checks, an attacker can easily trigger the undesired behavior without needing elevated credentials. Consequently, while the risk is moderate, the potential impact could be significant if the plugin grants privileged actions.

Generated by OpenCVE AI on April 30, 2026 at 18:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Elastic Email Subscribe Form plugin to a version beyond 1.2.2.
  • Verify the plugin's access control configuration to ensure that only authorized roles can access privileged functions.
  • If a patch is not immediately available, disable or uninstall the plugin until the issue is resolved.

Generated by OpenCVE AI on April 30, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17176 Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elastic Email Subscribe Form: from n/a through 1.2.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elastic Email Subscribe Form: from n/a through 1.2.2. Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form elastic-email-subscribe-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elastic Email Subscribe Form: from n/a through <= 1.2.2.
Title WordPress Elastic Email Subscribe Form <= 1.2.2 - Broken Access Control Vulnerability WordPress Elastic Email Subscribe Form plugin <= 1.2.2 - Broken Access Control Vulnerability
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Fri, 06 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elastic Email Subscribe Form: from n/a through 1.2.2.
Title WordPress Elastic Email Subscribe Form <= 1.2.2 - Broken Access Control Vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:52.317Z

Reserved: 2025-03-11T08:10:44.966Z

Link: CVE-2025-28985

cve-icon Vulnrichment

Updated: 2025-06-06T16:10:30.479Z

cve-icon NVD

Status : Deferred

Published: 2025-06-06T13:15:29.287

Modified: 2026-04-23T15:26:43.793

Link: CVE-2025-28985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T18:15:06Z

Weaknesses