Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total20
Critical2
High8
Medium10
Reset
Showing 1-20 of 20 records
Threat Entry Updated 2026-03-19

CVE-2026-3090 - Post Smtp Plugin

The Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘event_type’ parameter in all versions up to, and including, 3.8.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability is only exploitable when the Post SMTP Pro plugin is also installed and its Reporting and…

PLUGIN Post Smtp

CVE-2026-3090

HIGH CVSS 7.2 2026-03-18
Threat Entry Updated 2026-03-19

CVE-2026-2559 - Post Smtp Plugin

The Post SMTP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `handle_office365_oauth_redirect()` function in all versions up to, and including, 3.8.0. This is due to the function being hooked to `admin_init` without any `current_user_can()` check or nonce verification. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the site's Office 365 OAuth mail configuration (access token, refresh token, and user email) via a crafted URL. The configuration option is used during wizard setup of Microsoft365…

PLUGIN Post Smtp

CVE-2026-2559

MEDIUM CVSS 5.3 2026-03-18
Threat Entry Updated 2025-12-04

CVE-2025-12887 - Post Smtp Plugin

The Post SMTP plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.1. This is due to the plugin not properly verifying that a user is authorized to update OAuth tokens on the 'handle_gmail_oauth_redirect' function. This makes it possible for authenticated attackers, with subscriber level access and above, to inject invalid or attacker-controlled OAuth credentials.

PLUGIN Post Smtp

CVE-2025-12887

MEDIUM CVSS 5.4 2025-12-03
Threat Entry Updated 2025-11-04

CVE-2025-11833 - Post Smtp Plugin

The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.

PLUGIN Post Smtp

CVE-2025-11833

CRITICAL CVSS 9.8 2025-11-01
Threat Entry Updated 2025-09-04

CVE-2025-9219 - Post Smtp Plugin

The Post SMTP – WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications – Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_post_smtp_pro_option_callback' function in all versions up to, and including, 3.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable pro extensions.

PLUGIN Post Smtp

CVE-2025-9219

MEDIUM CVSS 4.3 2025-09-03
Threat Entry Updated 2025-03-13

CVE-2024-13844 - Post Smtp Plugin

The Post SMTP plugin for WordPress is vulnerable to generic SQL Injection via the ‘columns’ parameter in all versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Post Smtp

CVE-2024-13844

MEDIUM CVSS 4.9 2025-03-08
Threat Entry Updated 2025-02-21

CVE-2025-0521 - Post Smtp Plugin

The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Post Smtp

CVE-2025-0521

HIGH CVSS 7.2 2025-02-18
Threat Entry Updated 2025-06-05

CVE-2024-5207 - Post Smtp Plugin

The POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications plugin for WordPress is vulnerable to time-based SQL Injection via the selected parameter in all versions up to, and including, 2.9.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator access or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Post Smtp

CVE-2024-5207

HIGH CVSS 7.2 2024-05-30
Threat Entry Updated 2025-06-02

CVE-2023-3178 - Post Smtp Plugin

The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack.

PLUGIN Post Smtp

CVE-2023-3178

MEDIUM CVSS 4.3 2024-01-16
Threat Entry Updated 2025-06-20

CVE-2023-6620 - Post Smtp Plugin

The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.

PLUGIN Post Smtp

CVE-2023-6620

HIGH CVSS 7.2 2024-01-15
Threat Entry Updated 2025-06-04

CVE-2023-6875 - Post Smtp Plugin

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.

PLUGIN Post Smtp

CVE-2023-6875

CRITICAL CVSS 9.8 2024-01-11
Threat Entry Updated 2025-06-18

CVE-2023-6621 - Post Smtp Plugin

The POST SMTP WordPress plugin before 2.8.7 does not sanitise and escape the msg parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

PLUGIN Post Smtp

CVE-2023-6621

MEDIUM CVSS 6.1 2024-01-03
Threat Entry Updated 2024-11-21

CVE-2023-7027 - Post Smtp Plugin

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Post Smtp

CVE-2023-7027

HIGH CVSS 7.2 2024-01-03
Threat Entry Updated 2024-11-21

CVE-2023-6629 - Post Smtp Plugin

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘msg’ parameter in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Post Smtp

CVE-2023-6629

MEDIUM CVSS 6.1 2024-01-03
Threat Entry Updated 2025-06-04

CVE-2023-5958 - Post Smtp Plugin

The POST SMTP Mailer WordPress plugin before 2.7.1 does not escape email message content before displaying it in the backend, allowing an unauthenticated attacker to perform XSS attacks against highly privileged users.

PLUGIN Post Smtp

CVE-2023-5958

MEDIUM CVSS 6.1 2023-11-27
Threat Entry Updated 2025-06-04

CVE-2023-3179 - Post Smtp Plugin

The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).

PLUGIN Post Smtp

CVE-2023-3179

HIGH CVSS 8.8 2023-07-17
Threat Entry Updated 2026-04-08

CVE-2021-4422 - Post Smtp Plugin

The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Post Smtp

CVE-2021-4422

MEDIUM CVSS 4.3 2023-07-12
Threat Entry Updated 2025-06-04

CVE-2023-3082 - Post Smtp Plugin

The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Post Smtp

CVE-2023-3082

HIGH CVSS 7.2 2023-07-12
Threat Entry Updated 2025-05-21

CVE-2022-2352 - Post Smtp Plugin

The Post SMTP Mailer/Email Log WordPress plugin before 2.1.7 does not have proper authorisation in some AJAX actions, which could allow high privilege users such as admin to perform blind SSRF on multisite installations for example.

PLUGIN Post Smtp

CVE-2022-2352

HIGH CVSS 7.2 2022-09-26
Threat Entry Updated 2024-11-21

CVE-2022-2351 - Post Smtp Plugin

The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed.

PLUGIN Post Smtp

CVE-2022-2351

MEDIUM CVSS 4.8 2022-09-16
Scroll to top