MDirector Newsletter Vulnerability (Medium) – CVE-2025-14852

MDirector Newsletter Vulnerability (Medium) – CVE-2025-14852

by | Feb 13, 2026 | Plugins

Attack Vectors

MDirector Newsletter (slug: mdirector-newsletter) versions 4.5.8 and earlier have a Medium-severity Cross-Site Request Forgery (CSRF) vulnerability (CVE-2025-14852, CVSS 4.3). This type of issue typically doesn’t require the attacker to log in; instead, it relies on influencing a trusted user’s browser.

In practical terms, an attacker can send a crafted link or lure an administrator into visiting a page that silently submits a request on their behalf. If the administrator is currently logged into WordPress, the forged request can be processed as if it were legitimately initiated by that administrator.

Security Weakness

According to the published advisory, the weakness is missing nonce verification in the plugin’s mdirectorNewsletterSave function. In WordPress, nonces are commonly used to confirm that a settings change request is intentional and originates from an authorized session.

Without this verification step, settings-update requests can be accepted even when they were triggered indirectly through a malicious prompt (such as clicking a link), rather than through a deliberate action inside the WordPress admin interface.

Technical or Business Impacts

The stated impact is unauthorized changes to MDirector Newsletter configuration settings. While the CVSS vector indicates no confidentiality impact and a limited integrity impact, unauthorized configuration changes can still create meaningful business risk—especially for organizations that rely on email/newsletter operations as a revenue or customer-communication channel.

Potential business outcomes include disrupted newsletter workflows, unwanted changes to outbound messaging configuration, reputational harm if communications are altered or sent incorrectly, and added operational overhead for marketing and IT teams who must investigate and restore correct settings. For compliance-focused teams, unplanned changes to customer communication systems can also complicate audit trails and internal controls.

Remediation note: the advisory indicates no known patch is available at this time. Organizations should evaluate mitigations aligned with risk tolerance, which may include uninstalling MDirector Newsletter and replacing it with an alternative solution, and tightening administrative practices to reduce the likelihood of administrators being tricked into triggering a forged request.

Similar Attacks

CSRF has been a recurring issue across web applications and platforms, including high-profile real-world incidents. Examples include:

Netgear router CSRF issues enabling unauthorized actions

YouTube CSRF bug that could trigger actions via forged requests

WordPress plugin vulnerabilities and the broader risk they pose

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers