The most common vuln in email subscription that I've seen is spamming:
If you found any email subscription form, try to spam yourself by subscribing multiple times:
```sh
email@example.com (your original mail box)
email+random1@example.com (messages will be sent to 'email@example.com')
email+random2@example.com
...
```
Why company don't want it? It's possible to use this vuln to make all their emails appear in spam folder by-default by spamming innocent users which will report it as spam.
If you can subscribe via cURL copied command and rate limit is low, then you can get bounty for that depending on the bugbounty rules.
To do that - select request in devTools/Burp and copy as cURL command. Edit email and send request.
## HTML Injection
If you can inject HTML into additional email subscription fields (like name) (those fields oftem have characters limit), than you can create legitemate looking spam/scam/phishing email with like: