VYPR
Medium severity4.3NVD Advisory· Published Sep 5, 2025· Updated Apr 28, 2026

CVE-2025-58800

CVE-2025-58800

Description

Cross-Site Request Forgery (CSRF) vulnerability in Steve Truman WP Email Template wp-email-template allows Cross Site Request Forgery.This issue affects WP Email Template: from n/a through <= 2.8.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in WP Email Template plugin (≤2.8.5) allows attackers to force privileged users to execute unwanted actions.

Vulnerability

Overview

The WP Email Template plugin for WordPress (versions up to and including 2.8.5) contains a Cross-Site Request Forgery (CSRF) vulnerability [1]. This flaw arises from insufficient validation of requests made to the plugin's by authenticated users, allowing an attacker to trick a privileged user into unknowingly performing actions on the attacker's behalf [1].

Exploitation

Details

Exploitation requires user interaction: a privileged user must click a malicious link, visit a crafted page, or submit a specially designed form while authenticated to the WordPress site [1]. No direct authentication is needed for the attacker, but the victim must have sufficient privileges (e.g., admin or editor) for the attack to succeed [1]. The attack can be initiated remotely without any special network access [1].

Impact

Successful exploitation could allow an attacker to force the victim to execute unwanted actions under their current session, such as changing settings, creating new admin accounts, or modifying email templates [1]. This type of vulnerability is commonly used in mass-exploit campaigns targeting thousands of websites [1].

Mitigation

The vendor has not released a patched version at the time of this writing of this analysis; users are advised to update the plugin as soon as a fix becomes available [1]. As an immediate workaround, users can ask their hosting provider or web host or developer for assistance, or consider disabling the plugin until a patch is applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.