The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpexperts post Smtp
|
|
CPEs | cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpexperts post Smtp Mailer
|
Wpexperts post Smtp
|
Thu, 07 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-352 | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: WPScan
Published: 2023-07-17T13:29:54.425Z
Updated: 2024-11-07T14:18:23.148Z
Reserved: 2023-06-09T08:24:57.044Z
Link: CVE-2023-3179

Updated: 2024-08-02T06:48:08.071Z

Status : Modified
Published: 2023-07-17T14:15:10.843
Modified: 2025-06-04T15:05:06.540
Link: CVE-2023-3179

No data.