Authorization Bypass Vulnerability in Sendmachine for WordPress Plugin
CVE-2026-6235

9.8CRITICAL

Key Information:

Vendor

WordPress

Vendor
CVE Published:
22 April 2026

What is CVE-2026-6235?

The Sendmachine for WordPress plugin is susceptible to an authorization bypass vulnerability due to inadequate verification of user permissions in the 'manage_admin_requests' function. This flaw affects all versions up to and including 1.0.20. As a consequence, unauthorized individuals can gain access to the plugin's SMTP configuration settings, allowing them to manipulate email transmissions from the site. This can facilitate the interception of sensitive communications, including password reset emails, posing a significant risk to users and the site's security.

Affected Version(s)

Sendmachine for WordPress 0 <= 1.0.20

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nabil Irawan
.