Data Modification Vulnerability in Post SMTP Plugin for WordPress
CVE-2025-9219

4.3MEDIUM

What is CVE-2025-9219?

The Post SMTP plugin for WordPress, designed for managing SMTP configurations and email notifications, is susceptible to unauthorized data modifications. This vulnerability stems from a lack of capability checks in the 'update_post_smtp_pro_option_callback' function. As a result, authenticated users with Subscriber-level access or higher can enable pro features without the necessary permissions. Users are encouraged to update to the latest version to mitigate this risk.

Affected Version(s)

Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more * <= 3.4.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matteo Leonelli
David Dewes
.
CVE-2025-9219 : Data Modification Vulnerability in Post SMTP Plugin for WordPress