First published: Wed Jul 12 2023(Updated: )
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Post SMTP | <2.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3082 is a vulnerability in the Post SMTP plugin for WordPress that allows unauthenticated attackers to inject arbitrary web scripts via email contents.
CVE-2023-3082 can be exploited to execute malicious scripts on WordPress pages.
CVE-2023-3082 has a severity rating of high, with a CVSS score of 6.1.
To fix CVE-2023-3082, update the Post SMTP plugin for WordPress to version 2.5.8 or above.
You can find more information about CVE-2023-3082 in the official WordPress plugin repository and on the Wordfence website.