Description
Cross-Site Request Forgery (CSRF) vulnerability in Rhys Wynne WP Email Capture wp-email-capture allows Cross Site Request Forgery.This issue affects WP Email Capture: from n/a through <= 3.12.5.
Published: 2025-12-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a Cross‑Site Request Forgery flaw that allows an attacker to trick an authenticated WordPress user into performing actions configured by the WP Email Capture plugin. Because the plugin does not validate request authenticity, a crafted URL or form can change settings or submit email captures without the user’s consent, potentially leading to data leakage or unauthorized configuration changes. The weakness is classified as CWE‑352.

Affected Systems

The flaw affects the WP Email Capture plugin created by Rhys Wynne. Versions from the earliest available up to and including 3.12.5 are impacted. WordPress sites that have this plugin installed and are running a vulnerable version are at risk.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. The EPSS score of less than 1 % indicates that exploitation is considered unlikely at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely through a web browser, where an attacker hosts a malicious page that automatically submits a request to the site while a logged‑in user visits the page. Successful exploitation requires that the target user be authenticated and that the plugin’s admin or capture endpoints be reachable.

Generated by OpenCVE AI on April 28, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Email Capture to a version beyond 3.12.5, which removes the CSRF flaw.
  • Restrict or disable the plugin’s administrative actions when they are not needed, thereby minimizing the exposure of vulnerable endpoints.
  • Add CSRF protection to all forms that submit data to the plugin, for example by using WordPress nonces or custom tokens, to prevent unauthorized requests.

Generated by OpenCVE AI on April 28, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Rhys Wynne
Rhys Wynne wp Email Capture
Wordpress
Wordpress wordpress
Vendors & Products Rhys Wynne
Rhys Wynne wp Email Capture
Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 12:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Rhys Wynne WP Email Capture wp-email-capture allows Cross Site Request Forgery.This issue affects WP Email Capture: from n/a through <= 3.12.5.
Title WordPress WP Email Capture plugin <= 3.12.5 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Rhys Wynne Wp Email Capture
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:29.921Z

Reserved: 2025-12-19T10:17:03.706Z

Link: CVE-2025-68529

cve-icon Vulnrichment

Updated: 2025-12-24T19:07:45.361Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:22.357

Modified: 2026-04-27T19:16:28.390

Link: CVE-2025-68529

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:30:37Z

Weaknesses