Description
Cross-Site Request Forgery (CSRF) vulnerability in nonletter Newsletter subscription optin module newsletter-subscription-widget-for-sendblaster allows Stored XSS.This issue affects Newsletter subscription optin module: from n/a through <= 1.2.9.
Published: 2025-08-28
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery flaw in the Newsletter subscription optin module allows an attacker to submit a crafted request that results in arbitrary malicious script being stored in the WordPress database. When a site visitor subsequently loads a page containing the stored data, the script executes in their browser, leading to credential theft, session hijacking, or defacement. This issue is formally classified as CWE‑352 and highlights that improper request validation can compromise client‑side code execution.

Affected Systems

WordPress sites running the Newsletter subscription optin module plugin version 1.2.9 or earlier are vulnerable. The plugin, known as newsletter‑subscription‑widget‑for‑sendblaster, is distributed under the nonletter namespace and is commonly referenced in WordPress plugin repositories.

Risk and Exploitability

The CVSS score of 7.1 indicates a high overall risk. The EPSS score is below 1%, suggesting exploitation is currently unlikely but not impossible. The vulnerability is not listed in the CISA KEV catalog. An attacker could potentially exploit this vulnerability by forging a request to the plugin’s endpoint, resulting in a malicious payload being stored in the WordPress database and executed when visitors load the affected page (inferred). The stored payload would persist until the database entry is modified or the plugin is removed.

Generated by OpenCVE AI on May 1, 2026 at 06:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the newest release of the Newsletter subscription optin module plugin (greater than version 1.2.9).
  • If an update is not immediately available, temporarily disable or uninstall the plugin to prevent further storage of malicious content.
  • Apply web‑application firewall rules that block POST requests to the plugin’s endpoint or that validate the presence of a correct CSRF nonce before allowing data to be stored.

Generated by OpenCVE AI on May 1, 2026 at 06:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26050 Cross-Site Request Forgery (CSRF) vulnerability in nonletter Newsletter subscription optin module allows Stored XSS. This issue affects Newsletter subscription optin module: from n/a through 1.2.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in nonletter Newsletter subscription optin module allows Stored XSS. This issue affects Newsletter subscription optin module: from n/a through 1.2.9. Cross-Site Request Forgery (CSRF) vulnerability in nonletter Newsletter subscription optin module newsletter-subscription-widget-for-sendblaster allows Stored XSS.This issue affects Newsletter subscription optin module: from n/a through <= 1.2.9.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 28 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in nonletter Newsletter subscription optin module allows Stored XSS. This issue affects Newsletter subscription optin module: from n/a through 1.2.9.
Title WordPress Newsletter subscription optin module plugin <= 1.2.9 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:55.866Z

Reserved: 2025-05-19T14:13:45.513Z

Link: CVE-2025-48308

cve-icon Vulnrichment

Updated: 2025-08-28T13:25:46.804Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:15:38.373

Modified: 2026-04-23T15:31:04.603

Link: CVE-2025-48308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T06:45:11Z

Weaknesses