Stored Cross-Site Scripting in Post SMTP Plugin for WordPress
CVE-2025-0521
6.1MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 18 February 2025
Summary
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting due to inadequate input sanitization and output escaping in the 'from' and 'subject' parameters. This security flaw allows unauthenticated attackers to inject malicious web scripts into pages, which are executed whenever a user visits any affected page. It is crucial for users to ensure their installations are updated to mitigate the risk of exploitation.
Affected Version(s)
Post SMTP – WordPress SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more * <= 3.0.2
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
D.Sim