First published: Tue Jan 16 2024(Updated: )
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpexperts Post SMTP | <2.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2023-3178 vulnerability has a moderate severity level due to the risk of CSRF attacks allowing unauthorized log deletion.
To fix CVE-2023-3178, update the Post SMTP Mailer WordPress plugin to version 2.5.7 or later.
CVE-2023-3178 affects users of the Post SMTP Mailer WordPress plugin versions prior to 2.5.7.
CVE-2023-3178 allows attackers to execute a CSRF attack, potentially enabling logged-in users to delete arbitrary logs.
Users need to have the manage_postman_smtp capability to be affected by CVE-2023-3178.