Description
Missing Authorization vulnerability in Saad Iqbal Post SMTP post-smtp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through <= 2.9.11.
Published: 2025-01-13
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Missing authorization in the Post SMTP plugin allows an attacker to perform actions that should be protected by proper access controls. The vulnerability is classified as CWE‑862, meaning the system fails to enforce required permissions, which could lead to unauthorized configuration changes or exposure of sensitive data within the plugin’s administrative area. The CVSS score of 4.3 indicates a moderate risk level, reflecting the potential for non‑privileged users to gain elevated privileges inside the plugin’s functions.

Affected Systems

The affected product is the WordPress Post SMTP plugin developed by Saad Iqbal. Any installation of the plugin at version 2.9.11 or earlier is impacted; earlier undocumented versions up to 2.9.11 are also vulnerable.

Risk and Exploitability

The EPSS score of less than 1% demonstrates a low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. However, if an attacker gains access to an account that has administrative rights to the plugin or if the site’s lock‑out mechanisms are misconfigured, the missing authorization could be leveraged to alter mail settings, bypass security restrictions, or gather sensitive configuration data. Given the moderate CVSS score and low EPSS, the risk is moderate but not negligible, especially for high‑traffic or mission‑critical sites.

Generated by OpenCVE AI on May 1, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Post SMTP plugin to the latest version (at least 2.9.12).
  • Review and enforce strict user role permissions on the WordPress admin dashboard, limiting access to the Post SMTP configuration to trusted administrators.
  • Disable or remove any unused accounts and ensure that multi‑factor authentication is enabled for administrative access.

Generated by OpenCVE AI on May 1, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3004 Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11. Missing Authorization vulnerability in Saad Iqbal Post SMTP post-smtp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through <= 2.9.11.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 04 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpexperts
Wpexperts post Smtp
CPEs cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpexperts
Wpexperts post Smtp

Mon, 13 Jan 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Jan 2025 13:30:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.
Title WordPress Post SMTP plugin <= 2.9.11 - Broken Access Control vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Wpexperts Post Smtp
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:07.557Z

Reserved: 2025-01-07T21:05:34.184Z

Link: CVE-2025-22800

cve-icon Vulnrichment

Updated: 2025-01-13T13:44:53.506Z

cve-icon NVD

Status : Modified

Published: 2025-01-13T14:15:13.067

Modified: 2026-04-23T15:23:38.397

Link: CVE-2025-22800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T21:45:09Z

Weaknesses