Impact
The SMTP for Sendinblue – YaySMTP WordPress plugin (versions up to and including 1.2) harbors a stored cross‑site scripting flaw (CWE‑79). Inadequate input sanitization and output escaping enable an attacker to embed malicious JavaScript into the plugin’s email log entries. When any user opens a log page containing the injected script, the browser executes it, potentially stealing credentials, defacing the site, or redirecting the user to malicious content.
Affected Systems
WordPress sites that employ the SMTP for Sendinblue – YaySMTP plugin version 1.2 or earlier are affected. The product is sold by yaycommerce, and no additional operating system or server platform is implicated beyond the WordPress environment.
Risk and Exploitability
The flaw carries a CVSS score of 7.2, indicating high severity, while an EPSS score of under 1% implies a currently low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, but it is unauthenticated, meaning any visitor could inject scripts by abusing the plugin’s logging panel, and the stored nature of the XSS causes the risk to persist for all subsequent viewers of the contaminated page.
OpenCVE Enrichment
EUVD