Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wedevs
Wedevs wemail: Email Marketing, Email Automation, Newsletters, Subscribers & Ecommerce Email Optins Wordpress Wordpress wordpress |
|
| Vendors & Products |
Wedevs
Wedevs wemail: Email Marketing, Email Automation, Newsletters, Subscribers & Ecommerce Email Optins Wordpress Wordpress wordpress |
Sat, 21 Feb 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to unauthorized form deletion in all versions up to, and including, 2.0.7. This is due to the `Forms::permission()` callback only validating the `X-WP-Nonce` header without checking user capabilities. Since the REST nonce is exposed to unauthenticated visitors via the `weMail` JavaScript object on pages with weMail forms, any unauthenticated user can permanently delete all weMail forms by extracting the nonce from the page source and sending a DELETE request to the forms endpoint. | |
| Title | weMail <= 2.0.7 - Missing Authorization to Unauthenticated Form Deletion | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:37:15.300Z
Reserved: 2025-12-09T14:06:01.519Z
Link: CVE-2025-14339
Updated: 2026-02-25T21:18:41.520Z
Status : Deferred
Published: 2026-02-21T10:16:11.133
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14339
No data.
OpenCVE Enrichment
Updated: 2026-04-22T20:00:08Z