Description
The WP Test Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Email Logs in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-03-15
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via email logs
Action: Immediate patch
AI Analysis

Impact

The WP Test Email plugin for WordPress suffers from inadequate input sanitization and output escaping in its email logging feature, creating a stored cross‑site scripting flaw. Unauthenticated attackers can inject arbitrary scripts into the email logs, which are subsequently rendered in any page that displays those logs. When a legitimate user accesses an affected page, the injected script executes in the context of the user’s browser, potentially hijacking sessions, defacing content, or deferring further exploitation. The weakness is classified as CWE‑79, indicating a classic XSS vulnerability.

Affected Systems

The vulnerability applies to the WP Test Email plugin by boopathi0001 for WordPress versions up to and including 1.1.8. Any installation of this plugin within that version range that retains email logs is susceptible. The CPE mapping reflects the relevant WordPress plugin offering in the affected package.

Risk and Exploitability

The CVSS score of 7.2 marks this problem as high yet not critical, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild so far. The flaw is not listed in the CISA KEV catalog, meaning no known repeated exploitation has been documented recently. Attackers would need to identify a site that both hosts the vulnerable plugin and allows log storage or injection. Once compromised, the stored payload can affect any user who loads the page, yielding cross‑site session theft or defacement risks. Given the nature of the flaw, it is ideally mitigated before exploitation is observed, as the impact on user trust and site integrity is substantial when XSS succeeds.

Generated by OpenCVE AI on April 22, 2026 at 01:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Test Email plugin to the latest version that eliminates the XSS issue, if available.
  • If an update is not available or the plugin is unnecessary, deactivate or uninstall WP Test Email entirely.
  • Clear existing email logs and disable the logging feature to remove any injected scripts, or restrict log input to trusted sources.

Generated by OpenCVE AI on April 22, 2026 at 01:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6633 The WP Test Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Email Logs in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00129}

epss

{'score': 0.00197}


Tue, 25 Mar 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Boopathirajan
Boopathirajan wp Test Email
CPEs cpe:2.3:a:boopathirajan:wp_test_email:*:*:*:*:*:wordpress:*:*
Vendors & Products Boopathirajan
Boopathirajan wp Test Email

Mon, 17 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 15 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The WP Test Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Email Logs in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WP Test Email <= 1.1.8 - Unauthenticated Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Boopathirajan Wp Test Email
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:17.732Z

Reserved: 2025-03-14T17:36:58.499Z

Link: CVE-2025-2325

cve-icon Vulnrichment

Updated: 2025-03-17T16:52:09.165Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-15T07:15:35.107

Modified: 2025-03-25T20:07:03.383

Link: CVE-2025-2325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T02:00:05Z

Weaknesses