First published: Thu Jan 11 2024(Updated: )
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Post SMTP | <=2.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6875 has been rated as a medium severity vulnerability due to its potential for unauthorized data access.
To fix CVE-2023-6875, update the Post SMTP Mailer plugin to version 2.8.8 or later.
CVE-2023-6875 affects all versions of the Post SMTP Mailer plugin up to and including version 2.8.7.
CVE-2023-6875 is classified as a type juggling issue that can lead to unauthorized data access and modification.
Yes, CVE-2023-6875 allows unauthorized users to potentially access and modify data due to inadequate authentication controls.