SQL Injection Vulnerability in Post SMTP Plugin for WordPress
CVE-2024-13844

4.9MEDIUM

Summary

The Post SMTP plugin for WordPress contains a SQL injection vulnerability in the 'columns' parameter, present in all versions up to and including 3.1.2. This flaw arises from insufficient parameter escaping and inadequate preparation of SQL queries, allowing authenticated attackers with Administrator-level access or higher to inject malicious SQL statements into existing queries. This issue can result in unauthorized access to sensitive database information. To mitigate risks, users should upgrade to the latest version where the vulnerability has been fixed.

Affected Version(s)

Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more * <= 3.1.2

References

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nhien Pham
.