First published: Sat Feb 22 2025(Updated: )
The SMTP for Amazon SES – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
YaySMTP | <=1.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-0957 is considered high due to the potential for attackers to inject malicious scripts.
To fix CVE-2025-0957, update the YaySMTP plugin to version 1.7.2 or later, which addresses the vulnerability.
CVE-2025-0957 affects users of the YaySMTP plugin for WordPress in versions up to and including 1.7.1.
Due to CVE-2025-0957, attackers can execute stored cross-site scripting attacks, which may compromise user sessions or inject malicious content.
No, CVE-2025-0957 can be exploited by unauthenticated attackers, making it particularly dangerous.