Cyber Posture

CVE-2026-2025

High

Published: 04 March 2026

Published
04 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.2799 96.5th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2025 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces authorization checks on the Mail Mint plugin's REST API endpoint, directly preventing unauthenticated users from retrieving sensitive user email addresses.

prevent

Restricts public access to sensitive content such as user email addresses exposed via publicly accessible WordPress REST API endpoints.

prevent

Requires timely identification, reporting, and correction of flaws like the missing authorization in Mail Mint plugin versions prior to 1.19.5.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1087.003 Email Account Discovery
Adversaries may attempt to get a listing of email addresses and accounts.
T1589.002 Email Addresses Reconnaissance
Adversaries may gather email addresses that can be used during targeting.
Why these techniques?

Direct remote unauthenticated exploitation of public-facing WordPress REST endpoint (T1190) enabling collection of email addresses (T1087.003/T1589.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one of its REST API endpoint, allowing unauthenticated users to call it and retrieve the email addresses of users on the blog

Deeper analysisAI

CVE-2026-2025 is an information disclosure vulnerability in the Mail Mint WordPress plugin versions prior to 1.19.5. It arises from a missing authorization check in one of the plugin's REST API endpoints (CWE-200), enabling unauthenticated access to sensitive user data. Published on 2026-03-04, the issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact with no effects on integrity or availability.

Any unauthenticated attacker with network access can exploit this vulnerability by sending requests to the affected REST API endpoint. Exploitation requires low complexity, no privileges, and no user interaction, allowing remote retrieval of email addresses for all users registered on the targeted WordPress site. This exposure could facilitate spam, phishing, or account enumeration attacks.

The WPScan advisory at https://wpscan.com/vulnerability/1b815cde-cd9d-46fa-a6ab-3d2851705e7b/ details the issue, with mitigation achieved by updating the Mail Mint plugin to version 1.19.5 or later, which adds the necessary authorization controls.

Details

CWE(s)

CVEs Like This One

CVE-2026-25222Shared CWE-200
CVE-2026-24870Shared CWE-200
CVE-2024-57716Shared CWE-200
CVE-2026-23743Shared CWE-200
CVE-2025-67274Shared CWE-200
CVE-2026-34305Shared CWE-200
CVE-2026-21532Shared CWE-200
CVE-2025-25975Shared CWE-200
CVE-2025-22918Shared CWE-200
CVE-2026-2262Shared CWE-200

References