Description
The Solid Mail – SMTP email and logging made by SolidWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email Name, Subject, and Body in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-05-23
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via Email Fields
Action: Patch Now
AI Analysis

Impact

The Solid Mail plugin for WordPress stores arbitrary web scripts when an attacker supplies malicious content in the email name, subject, or body fields. Because the input is not sanitised or escaped, any user who later views the stored email content will have the injected script executed in their browser. The impact is the execution of the attacker's script in the victim's browser; such scripts could potentially allow the attacker to steal session cookies, deface the site, or redirect users to malicious sites—these uses are inferred from typical XSS behaviour and are not explicitly stated in the CVE description.

Affected Systems

All installations of the Solid Mail – SMTP email and logging plugin by SolidWP that are version 2.1.5 or earlier are affected. The flaw resides in the core email handling code and is present regardless of other configuration settings.

Risk and Exploitability

The CVSS score of 7.2 indicates a medium‑to‑high severity, while the EPSS score of less than 1% suggests that active exploitation in the wild is currently rare. The vulnerability is not included in the CISA KEV catalog. An unauthenticated attacker can reach the flaw through the public SMTP/email form provided by the plugin, send a crafted message containing malicious JavaScript, and later trigger its execution when any site visitor opens the email page. The lack of immediate exploitation evidence does not diminish the potential damage if the vulnerability were to be leveraged or if an attacker gains the capability to target the site.

Generated by OpenCVE AI on April 21, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Solid Mail plugin to the latest version that removes the XSS flaw
  • If upgrading is not immediately possible, restrict the SMTP/email form to authenticated users only or disable the feature entirely
  • Apply custom sanitisation to the email name, subject and body fields before storage, ensuring that all output is properly escaped when rendering the email page

Generated by OpenCVE AI on April 21, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27681 The Solid Mail – SMTP email and logging made by SolidWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email Name, Subject, and Body in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Fri, 23 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 May 2025 12:30:00 +0000

Type Values Removed Values Added
Description The Solid Mail – SMTP email and logging made by SolidWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email Name, Subject, and Body in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Solid Mail – SMTP email and logging made by SolidWP <= 2.1.5 - Unauthenticated Stored Cross-Site Scripting via Email
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:13.819Z

Reserved: 2025-02-07T18:57:25.546Z

Link: CVE-2025-1123

cve-icon Vulnrichment

Updated: 2025-05-23T12:48:30.740Z

cve-icon NVD

Status : Deferred

Published: 2025-05-23T13:15:25.820

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1123

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:45:25Z

Weaknesses