CVE-2025-12349
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| icegram | email_subscribers_newsletters_and_marketing_automation_plugin | 5.9.10 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Icegram Express plugin for WordPress allows unauthenticated attackers to bypass authorization checks in the trigger_mailing_queue_sending function. This means attackers can force the plugin to send emails immediately, ignoring the scheduled times, and can also alter the plugin's state, such as the last-cron-hit value. This flaw arises because the plugin does not properly verify if a user is authorized to perform these actions.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to abuse the email sending functionality, causing immediate and potentially large volumes of emails to be sent. This can increase server load, potentially leading to denial-of-service (DoS)-like effects, degrade performance, and disrupt normal email scheduling and plugin operation.