4.3
CVSSv3

CVE-2021-4422

Published: 12/07/2023 Updated: 07/11/2023
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated malicious users to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wpexperts post smtp mailer

Recent Articles

Need to prioritize security bug patches? Don't forget to scan Twitter as well as use CVSS scores
The Register • Thomas Claburn in San Francisco • 19 Jan 2022

Get our weekly newsletter Exploit, vulnerability discussion online can offer useful signals

Organizations looking to minimize exposure to exploitable software should scan Twitter for mentions of security bugs as well as use the Common Vulnerability Scoring System or CVSS, Kenna Security argues. Better still is prioritizing the repair of vulnerabilities for which exploit code is available, if that information is known. CVSS is a framework for rating the severity of software vulnerabilities (identified using CVE, or Common Vulnerability Enumeration, numbers), on a scale from 1 (least sev...