Description
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-02-18
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting allowing unauthenticated arbitrary script execution
Action: Patch Immediately
AI Analysis

Impact

The Post SMTP plugin for WordPress is vulnerable to a stored cross‑site scripting flaw in all versions up to and including 3.0.2. The vulnerability stems from insufficient input sanitization and output escaping of the "from" and "subject" parameters, permitting an attacker to inject malicious scripts that are then saved to the database. When a user later loads a page that displays the stored email data, the injected scripts run in the user’s browser, potentially enabling credential theft, session hijacking, website defacement, or further compromise of the site. This weakness is classified as CWE‑79 and represents a high‑impact flaw because it is exploitable by unauthenticated users without the need to compromise the WordPress administrator account.

Affected Systems

All installations of the WordPress plugin "Post SMTP – Complete Email Deliverability and SMTP Solution with Email Logs, Alerts, Backup SMTP & Mobile App" with versions 3.0.2 and earlier are affected. These releases are identified by the CPE "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*". Any WordPress site running the plugin within these vulnerable versions is at risk.

Risk and Exploitability

The vulnerability has a CVSS score of 7.2, indicating moderate to high severity. The EPSS score of less than 1% suggests that, as of the time of analysis, the probability of exploitation is low but not negligible, and there is no indication that the flaw has been observed in the wild (flagged in CISA’s KEV catalog). Attackers can exploit the flaw simply by embedding a malicious script into the "from" or "subject" fields of an email processed by the plugin, which does not require authentication. The injected code will execute every time a user views the corresponding page, which makes this a persistent threat until mitigated.

Generated by OpenCVE AI on April 22, 2026 at 13:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Post SMTP to the latest release (v3.0.3 or newer)
  • Remove any email entries that contain injected script content in the database
  • Apply a web application firewall or enforce a strict content security policy to block execution of unexpected scripts until the plugin is patched

Generated by OpenCVE AI on April 22, 2026 at 13:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4802 The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 21 Feb 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Wpexperts
Wpexperts post Smtp
CPEs cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpexperts
Wpexperts post Smtp

Tue, 18 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 11:15:00 +0000

Type Values Removed Values Added
Description The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Post SMTP <= 3.0.2 - Unauthenticated Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wpexperts Post Smtp
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:08.793Z

Reserved: 2025-01-16T17:53:46.524Z

Link: CVE-2025-0521

cve-icon Vulnrichment

Updated: 2025-02-18T14:26:19.284Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-18T11:15:12.740

Modified: 2025-02-21T12:16:09.897

Link: CVE-2025-0521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:30:17Z

Weaknesses