CVE-2025-14348 (CNNVD-202601-3308)
中文标题:
WordPress plugin weMail 授权问题漏洞
英文标题:
weMail <= 2.0.7 - Insufficient Authorization via x-wemail-user Header to Sensitive Information Disclosure
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin weMail 2.0.7及之前版本存在授权问题漏洞,该漏洞源于REST API信任HTTP标头x-wemail-user识别用户而未验证请求来源,可能导致未经验证的攻击者冒充用户并访问CSV订阅者端点,泄露个人信息。
英文描述:
The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.0.7. This is due to the plugin's REST API trusting the `x-wemail-user` HTTP header to identify users without verifying the request originates from an authenticated WordPress session. This makes it possible for unauthenticated attackers who know or can guess an admin email (easily enumerable via `/wp-json/wp/v2/users`) to impersonate that user and access the CSV subscriber endpoints, potentially exfiltrating subscriber PII (emails, names, phone numbers) from imported CSV files.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| wedevs | weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation | - | ≤ 2.0.7 | - |
cpe:2.3:a:wedevs:wemail_–_email_marketing,_lead_generation,_optin_forms,_email_newsletters,_a_b_testing,_and_automation:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-14348 |
2026-01-21 02:31:17 | 2026-01-20 22:00:02 |
| NVD | nvd_CVE-2025-14348 |
2026-01-21 02:00:05 | 2026-01-20 22:00:12 |
| CNNVD | cnnvd_CNNVD-202601-3308 |
2026-01-26 02:10:02 | 2026-01-25 18:11:55 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202601-3308
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']