PT-2025-11223 · Undefined · Undefined
Published
2025-03-13
·
Updated
2025-07-28
·
CVE-2025-24000
None
**Name of the Vulnerable Software and Affected Versions:**
Post SMTP versions up to 3.2.0
**Description:**
A broken access control vulnerability allows low-privileged users to potentially take over administrator accounts and gain full control of WordPress sites. The vulnerability stems from insufficient permission checks within the plugin’s REST API endpoints, allowing users with limited privileges to access sensitive information, such as email logs, and initiate actions like password resets for administrator accounts. Over 400,000 WordPress sites are estimated to use the affected plugin. More than 200,000 sites remain vulnerable due to not updating to the patched version.
**Recommendations:**
Update to Post SMTP version 3.3.0 or later.
Related Identifiers
Affected Products
References · 15
- https://twitter.com/attefall/status/1948610394546720772 · Twitter Post
- https://t.me/pentestingnews/65123 · Telegram Post
- https://twitter.com/PaxionCyber/status/1949817460422525181 · Twitter Post
- https://twitter.com/Sector_Sec/status/1949732977208156603 · Twitter Post
- https://twitter.com/dCypherIO/status/1949839765395632466 · Twitter Post
- https://twitter.com/Strivehawk/status/1949251438523068679 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1949800195476123804 · Twitter Post
- https://twitter.com/fridaysecurity/status/1948538886206226730 · Twitter Post
- https://twitter.com/cyashadotcom/status/1949493824641724599 · Twitter Post
- https://twitter.com/transilienceai/status/1900158872272212164 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1948638970340147491 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1m9xpwg/security_flaw_in_post_smtp_plugin_puts_over_200k · Reddit Post
- https://i.redd.it/zdfxeqnocmff1.jpeg · Reddit Post
- https://twitter.com/TweetThreatNews/status/1949175075329995156 · Twitter Post
- https://t.me/true_secator/7272 · Telegram Post