CVE-2025-12349
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-19

Last updated on: 2025-11-19

Assigner: Wordfence

Description
The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `trigger_mailing_queue_sending` function. This makes it possible for unauthenticated attackers to force immediate email sending, bypass the schedule, increase server load, and change plugin state (e.g., last-cron-hit), enabling abuse or DoS-like effects.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-19
Last Modified
2025-11-19
Generated
2026-05-06
AI Q&A
2025-11-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
icegram email_subscribers_newsletters_and_marketing_automation_plugin 5.9.10
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Icegram Express plugin for WordPress allows unauthenticated attackers to bypass authorization checks in the trigger_mailing_queue_sending function. This means attackers can force the plugin to send emails immediately, ignoring the scheduled times, and can also alter the plugin's state, such as the last-cron-hit value. This flaw arises because the plugin does not properly verify if a user is authorized to perform these actions.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to abuse the email sending functionality, causing immediate and potentially large volumes of emails to be sent. This can increase server load, potentially leading to denial-of-service (DoS)-like effects, degrade performance, and disrupt normal email scheduling and plugin operation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart