The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34249 | The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpexperts post Smtp
|
|
| CPEs | cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpexperts post Smtp Mailer
|
Wpexperts post Smtp
|
Mon, 21 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-21T18:10:38.184Z
Reserved: 2023-07-11T18:37:13.653Z
Link: CVE-2021-4422
Updated: 2024-08-03T17:23:10.780Z
Status : Modified
Published: 2023-07-12T07:15:09.997
Modified: 2025-06-04T15:05:06.540
Link: CVE-2021-4422
No data.
OpenCVE Enrichment
No data.
EUVD