weMail: Email Marketing, Email Automation, Newsletters, Subscribers…

weMail: Email Marketing, Email Automation, Newsletters, Subscribers…

by | Feb 21, 2026 | Plugins

Attack Vectors

CVE-2025-14339 is a Medium severity vulnerability (CVSS 6.5) affecting the WordPress plugin weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins (slug: wemail) in versions up to and including 2.0.7. It allows an unauthenticated attacker to delete weMail forms.

The practical attack path is straightforward for a public-facing site that displays weMail forms: the page can expose a REST security token (“nonce”) through the plugin’s front-end JavaScript object. An attacker can extract that value from the page source and then send a crafted REST request to delete forms—without needing to log in.

Reference: CVE-2025-14339 record.

Security Weakness

The root issue is missing authorization checks for a sensitive action (form deletion). The plugin’s permission callback (Forms::permission()) validates the presence of the REST nonce header (X-WP-Nonce) but does not verify that the requester is an authenticated user with appropriate capabilities to delete forms.

In other words, the control relies on a token that can be exposed to site visitors on pages that include weMail forms, instead of enforcing role-based permissions. This creates a gap where “has a token” effectively becomes “is allowed,” even when the requester is not logged in.

Remediation guidance from the vendor/community source is to update to weMail 2.0.8 or newer, which includes the patch.

Technical or Business Impacts

Loss of lead capture capability: Deleted weMail opt-in forms can immediately reduce newsletter signups, campaign list growth, and eCommerce opt-in conversions—impacting pipeline and revenue attribution tied to email marketing.

Campaign disruption and operational overhead: Marketing teams may spend time diagnosing “why forms stopped working,” rebuilding forms, re-embedding form shortcodes/blocks, and validating integrations. This increases costs and can delay campaigns and launches.

Data and compliance considerations: While this issue is described as enabling form deletion (not direct data theft), sudden changes to lead-capture mechanisms can create recordkeeping gaps, consent-flow inconsistencies, and audit headaches—especially for organizations with compliance oversight (e.g., documenting consent language and retention practices).

Similar Attacks

Authorization gaps and exposed API endpoints have driven multiple high-impact incidents across popular platforms. Examples include:

WordPress REST API content injection (CVE-2017-1001000)
Drupal “Drupalgeddon 2” access-control/RCE chain (CVE-2018-7600)

In each case, inadequate access controls on powerful endpoints turned routine web requests into business-impacting events—underscoring why “who is allowed to do this action” must be enforced server-side, not inferred from a token or front-end behavior.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers