Mailchimp List Subscribe Form Vulnerability (Medium) – CVE-2025-12172

Mailchimp List Subscribe Form Vulnerability (Medium) – CVE-2025-12172

by | Feb 18, 2026 | Plugins

Attack Vectors

Mailchimp List Subscribe Form (slug: mailchimp) versions 2.0.0 and below contain a Medium-severity issue (CVSS 4.3, CVE-2025-12172) that can be exploited through Cross-Site Request Forgery (CSRF). In practical terms, an attacker can send a crafted link or request that only works if a trusted user (typically a WordPress administrator) is tricked into clicking or otherwise initiating the action while logged in.

This vulnerability does not require the attacker to log in to your site. Instead, it relies on user interaction and the fact that a logged-in administrator’s browser may submit a forged request that the site incorrectly accepts as legitimate.

Similar attacks using CSRF-style “trick the admin into clicking” methods have appeared in many platforms and products over time. Examples include Jenkins Script Console exposure scenarios (Rapid7 module reference), CSRF issues affecting NETGEAR routers (CISA alert), and numerous documented CSRF cases in the NVD database.

Security Weakness

The underlying weakness is missing or incorrect nonce validation in the plugin’s mailchimp_sf_change_list_if_necessary() function. In WordPress terms, a nonce is a common safeguard that helps confirm a request was intentionally initiated by an authorized user inside the site’s normal workflow.

When that safeguard is absent or implemented incorrectly, the site may accept a request that appears to come from an administrator—even if it was initiated by an external page or link designed by an attacker. According to the published advisory, this can allow unauthenticated attackers to change Mailchimp lists, provided they can convince a site administrator to perform an action such as clicking a link.

Severity is rated Medium because the attack typically requires an administrator’s involvement (user interaction), but it can still lead to meaningful business-level disruption and loss of control over marketing operations.

Technical or Business Impacts

For marketing leaders and executives, the key risk is loss of integrity and control over your marketing list configuration. If your Mailchimp lists are changed without authorization, it can affect who receives campaigns, where leads are routed, and how segmentation is managed—potentially undermining planned campaigns and reporting accuracy.

Potential business impacts include misdirected communications (sending to the wrong audience), campaign performance distortion (skewed metrics and attribution), and operational churn (time spent auditing and restoring correct list settings). For compliance and privacy teams, unauthorized list changes can increase the risk of process breakdowns in consent and preference management, depending on how lists map to your organization’s marketing governance.

Remediation: Update Mailchimp List Subscribe Form to version 2.0.1 or newer, which is the patched release recommended by the advisory. For reference, see the CVE record (CVE-2025-12172) and the source advisory (Wordfence vulnerability entry).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers