9.8
CVSSv3

CVE-2023-6875

Published: 11/01/2024 Updated: 18/01/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated malicious users to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wpexperts post smtp mailer

Vendor Advisories

Check Point Reference: CPAI-2023-1469 Date Published: 16 Jan 2024 Severity: High ...

Exploits

WordPress POST SMTP Mailer plugin versions 287 and below suffer from authorization bypass and cross site scripting vulnerabilities ...

Github Repositories

Exploit for CVE-2023-6875 - Unauthorized Account Takeover.

CVE-2023-6875 Exploit for PostSMTP - Unauthorized Account Takeover PoC is now published It was created for educational/research purposes only! Use it at your own risk!

CVE-2023-6875 PoC

CVE-2023-6875 CVE-2023-6875 PoC This is the original proof of concept given to Wordfence for my participation in its Holiday Bug Bonanza An extra was given for this proof of concept code Thank you to Wordfence for the opportunity! I had a lot of fun during the Bug Bonanza and hope that it happens again