[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fnT_AS5dHMIBPY9z2Xc5-K25Pzkqrb_WIDDSl01HGOBM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-47540","wemail-unauthenticated-sensitive-information-exposure","weMail \u003C= 1.14.13 - Unauthenticated Sensitive Information Exposure","The weMail – Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A\u002FB Testing, and Automation plugin for WordPress is vulnerable to Sensitive Information Exposure via the users() function in all versions up to, and including, 1.14.13. This makes it possible for unauthenticated attackers to extract user emails.","wemail",null,"\u003C=1.14.13","1.14.14","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2025-05-07 00:00:00","2025-05-13 15:27:22",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0d997e98-dfb6-4f41-8711-7645d2a9435e?source=api-prod",7]