Stored Cross-Site Scripting in Post SMTP Plugin for WordPress
CVE-2025-0521

6.1MEDIUM

Summary

The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting due to inadequate input sanitization and output escaping in the 'from' and 'subject' parameters. This security flaw allows unauthenticated attackers to inject malicious web scripts into pages, which are executed whenever a user visits any affected page. It is crucial for users to ensure their installations are updated to mitigate the risk of exploitation.

Affected Version(s)

Post SMTP – WordPress SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more * <= 3.0.2

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

D.Sim
.