The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.
History

Fri, 20 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpexperts post Smtp
CPEs cpe:2.3:a:wpexperts:post_smtp_mailer:*:*:*:*:*:wordpress:*:* cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpexperts post Smtp Mailer
Wpexperts post Smtp

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-01-15T15:10:41.386Z

Updated: 2025-06-20T16:52:48.813Z

Reserved: 2023-12-08T10:30:24.389Z

Link: CVE-2023-6620

cve-icon Vulnrichment

Updated: 2024-08-02T08:35:14.814Z

cve-icon NVD

Status : Modified

Published: 2024-01-15T16:15:12.513

Modified: 2025-06-20T17:15:39.273

Link: CVE-2023-6620

cve-icon Redhat

No data.