The FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.2.82 via deserialization of untrusted input in the 'formatResult' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. The vulnerability was partially patched in version 2.2.82.
History

Sun, 24 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpmanageninja
Wpmanageninja fluentsmtp
CPEs cpe:2.3:a:wpmanageninja:fluentsmtp:-:*:*:*:*:wordpress:*:*
Vendors & Products Wpmanageninja
Wpmanageninja fluentsmtp
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 23 Nov 2024 07:45:00 +0000

Type Values Removed Values Added
Description The FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.2.82 via deserialization of untrusted input in the 'formatResult' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. The vulnerability was partially patched in version 2.2.82.
Title FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider <= 2.2.82 - Unauthenticated PHP Object Injection
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-23T07:38:05.537Z

Updated: 2024-11-24T18:33:24.437Z

Reserved: 2024-10-03T23:47:19.662Z

Link: CVE-2024-9511

cve-icon Vulnrichment

Updated: 2024-11-24T18:33:12.268Z

cve-icon NVD

Status : Received

Published: 2024-11-23T08:15:03.693

Modified: 2024-11-23T08:15:03.693

Link: CVE-2024-9511

cve-icon Redhat

No data.