Unauthorized Access to Data and Modification of Data in POST SMTP Mailer Plugin
CVE-2023-6875
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 11 January 2024
Badges
Summary
The POST SMTP Mailer plugin for WordPress is vulnerable due to a type juggling issue present on the connect-app REST endpoint in all versions up to and including 2.8.7. This vulnerability enables unauthenticated attackers to gain unauthorized access to sensitive data and make modifications. Specifically, attackers can exploit this vulnerability to reset the API key used for authenticating the mailer, gaining the ability to view logs that may contain sensitive information, such as password reset emails. This poses a significant risk of site takeover, as the leaked credentials could be used to compromise the security of affected WordPress installations.
Affected Version(s)
POST SMTP β The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications * <= 2.8.7
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
86% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved