WordPress SMTP Plugin Vulnerable to SQL Injection
CVE-2024-5207
7.2HIGH
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 30 May 2024
Summary
The POST SMTP Plugin for WordPress is susceptible to a time-based SQL Injection vulnerability. This issue arises from insufficient escaping of user-supplied parameters and inadequate query preparation in versions prior to 2.9.3. As a result, authenticated users with administrative permissions may exploit this flaw to insert harmful SQL queries into existing commands, potentially allowing them to extract sensitive information from the database. Proper security measures and updates are critical to safeguard against this vulnerability.
Affected Version(s)
Post SMTP – The WordPress SMTP Plugin with Email Logs and Mobile App for Email Failure Notifications * <= 2.9.3
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
ngocanh le