Description
Missing Authorization vulnerability in Elastic Email Elastic Email Sender elastic-email-sender allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elastic Email Sender: from n/a through <= 1.2.20.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A broken access control flaw in the Elastic Email Sender WordPress plugin allows an attacker to perform operations that normally require higher privileges. The vulnerability is classified as CWE‑862 and can potentially enable unauthorized users to manipulate email-sending functions or access sensitive configuration data. The exact scope of the impact depends on the plugin’s features, but it may permit unintended data exposure or service abuse within the affected WordPress installation.

Affected Systems

The flaw affects the Elastic Email Sender plugin for WordPress versions from the first release up to version 1.2.20. Any WordPress site installing or running these plugin versions is at risk.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, and the EPSS score of less than 1% signals a very low exploitation probability at this time. The vulnerability is not listed in the CISA KEV catalog. Based on the description, exploitation would likely involve sending specially crafted requests to the plugin’s protected endpoints; the access control checks that normally restrict these actions are bypassed, allowing an attacker who can reach the plugin interface to perform unauthorized operations. No public exploit is known, and no additional prerequisites are documented beyond the ability to interact with the WordPress plugin API.

Generated by OpenCVE AI on April 29, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Elastic Email Sender plugin to the latest available version that excludes this vulnerability.
  • If an upgrade is not immediately possible, restrict plugin access by configuring WordPress user roles so that only trusted administrators can access the plugin’s functionality.
  • Remove or deactivate the plugin from the WordPress installation if it is not required for site operations.

Generated by OpenCVE AI on April 29, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Elasticemail
Elasticemail elastic Email Sender
Wordpress
Wordpress wordpress
Vendors & Products Elasticemail
Elasticemail elastic Email Sender
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Elastic Email Elastic Email Sender elastic-email-sender allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Elastic Email Sender: from n/a through <= 1.2.20.
Title WordPress Elastic Email Sender plugin <= 1.2.20 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Elasticemail Elastic Email Sender
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:19.089Z

Reserved: 2025-12-04T04:07:13.046Z

Link: CVE-2025-66525

cve-icon Vulnrichment

Updated: 2025-12-10T22:00:17.992Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:19.600

Modified: 2026-04-27T18:16:38.047

Link: CVE-2025-66525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T20:00:18Z

Weaknesses