
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-9979 affects Maspik plugin versions 2.5.6 and below, specifically related to an Authenticated (Subscriber+) Missing Authorization to Spam Log Export vulnerability. The vulnerability was discovered and reported by Dmitrii Ignatyev on September 9, 2025, and received a CVSS score of 4.3 (Wordfence Intel).
The vulnerability is classified as a Cross-Site Request Forgery (CSRF) issue with a CVSS v3.1 vector of AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, resulting in a base score of 4.3. This indicates that the vulnerability requires network access and low privileges to exploit, with no user interaction needed, and can potentially lead to unauthorized access to spam log data (Wordfence Intel).
The vulnerability allows authenticated users with subscriber-level access or higher to potentially export spam log data without proper authorization. This could lead to unauthorized access to sensitive information stored in the spam logs (Wordfence Intel).
Users are advised to update their Maspik plugin to a version higher than 2.5.6 to address this vulnerability (Wordfence Intel).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."