Unauthorized Access in WP Mail Gateway Plugin for WordPress
CVE-2026-6963

8.8HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
2 May 2026

What is CVE-2026-6963?

The WP Mail Gateway plugin for WordPress has a vulnerability that allows unauthorized users to access and modify SMTP settings. This occurs due to a missing capability check in the AJAX action 'wmg_save_provider_config.' Attackers with Subscriber-level access or higher can exploit this flaw to update mail configurations. This could lead to potential privilege escalation, where the attacker can trigger password reset emails, thus gaining access to administrator accounts. It is crucial for users to patch their WordPress installations and ensure that only trusted users have appropriate access levels to mitigate such risks.

Affected Version(s)

WP Mail Gateway 0 <= 1.8

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nabil Irawan
.