PT-2026-36568 · WordPress · Wp Mail Gateway
Nabil Irawan
·
Published
2026-05-02
·
Updated
2026-05-02
·
CVE-2026-6963
CVSS v3.1
8.8
High
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WP Mail Gateway versions prior to 1.9
Description
The plugin is subject to unauthorized access because of a missing capability check on the 'wmg save provider config' AJAX action. Authenticated attackers with Subscriber-level access or higher can update SMTP settings and redirect mail. This can lead to privilege escalation by triggering a password reset email to gain access to an administrator account.
Recommendations
Update the plugin to a version later than 1.8.
As a temporary workaround, restrict access to the 'wmg save provider config' AJAX action to authorized users only.
Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wp Mail Gateway