First published: Wed Jul 12 2023(Updated: )
The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Post SMTP | <=2.0.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4422 is a vulnerability in the POST SMTP Mailer plugin for WordPress that allows unauthenticated attackers to trigger a CSV export via a CSRF attack.
CVE-2021-4422 has a severity rating of medium with a CVSS score of 4.3.
CVE-2021-4422 affects versions up to and including 2.0.20 of the POST SMTP Mailer plugin for WordPress.
CVE-2021-4422 has a CWE ID of 352.
To fix CVE-2021-4422, update the POST SMTP Mailer plugin for WordPress to a version higher than 2.0.20, as the vulnerability has been patched in later releases.