Unauthorized Access to Data and Modification of Data in POST SMTP Mailer Plugin
CVE-2023-6875

9.8CRITICAL

Key Information:

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 86%

Summary

The POST SMTP Mailer plugin for WordPress is vulnerable due to a type juggling issue present on the connect-app REST endpoint in all versions up to and including 2.8.7. This vulnerability enables unauthenticated attackers to gain unauthorized access to sensitive data and make modifications. Specifically, attackers can exploit this vulnerability to reset the API key used for authenticating the mailer, gaining the ability to view logs that may contain sensitive information, such as password reset emails. This poses a significant risk of site takeover, as the leaked credentials could be used to compromise the security of affected WordPress installations.

Affected Version(s)

POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications * <= 2.8.7

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

86% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ulyses Saicha
.