The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.
History

Sat, 02 Aug 2025 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Rustaurius
Rustaurius ultimate Wp Mail
CPEs cpe:2.3:a:rustaurius:ultimate_wp_mail:*:*:*:*:*:wordpress:*:*
Vendors & Products Rustaurius
Rustaurius ultimate Wp Mail

Wed, 16 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0004}


Wed, 16 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.
Title Ultimate WP Mail 1.0.17 - 1.3.6 - Missing Authorization to Authenticated (Contributor+) Privilege Escalation via get_email_log_details Function
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-07-16T09:22:56.563Z

Updated: 2025-07-16T14:40:19.407Z

Reserved: 2025-07-01T21:34:52.393Z

Link: CVE-2025-6993

cve-icon Vulnrichment

Updated: 2025-07-16T13:30:32.459Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-16T10:15:29.297

Modified: 2025-08-02T01:29:41.363

Link: CVE-2025-6993

cve-icon Redhat

No data.