Description
Cross-Site Request Forgery (CSRF) vulnerability in Zoho Mail Zoho ZeptoMail transmail allows Stored XSS.This issue affects Zoho ZeptoMail: from n/a through <= 3.3.1.
Published: 2025-12-31
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A Cross‑Site Request Forgery flaw in the Zoho ZeptoMail WordPress plugin permits an attacker to inject malicious scripts that are stored on the site. The stored XSS can execute in the browsers of anyone who views the impacted content, potentially allowing attackers to hijack sessions, deface the site, or exfiltrate data. This weakness falls under CWE‑352.

Affected Systems

The vulnerability exists in all releases of the Zoho ZeptoMail plugin up to and including version 3.3.1, regardless of when the plugin was first installed. It is deployed on WordPress sites that use Zoho Mail for email transmission.

Risk and Exploitability

The CVSS score of 7.1 indicates moderate to high impact, while the EPSS score of less than 1% suggests exploitation is unlikely but not impossible. The flaw is not listed in the CISA KEV catalog. The likely attack path would involve a victim’s browser being tricked into submitting a forged request that embeds attacker‑controlled script, which the plugin then stores and later renders without proper sanitization. Because the CVE description does not disclose an authentication requirement, it is inferred that the attack could occur even against unauthenticated visitors if the plugin accepts unchecked input from any user.

Generated by OpenCVE AI on April 30, 2026 at 04:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Zoho ZeptoMail plugin to a revision newer than 3.3.1 to remove the CSRF and stored XSS flaw.
  • If the plugin cannot be updated immediately, disable or uninstall it to eliminate the vulnerable component from the site.
  • Apply general WordPress hardening measures, such as enforcing HTTPS, using a web application firewall, and ensuring that all other plugins and the core are kept at their latest secure versions.

Generated by OpenCVE AI on April 30, 2026 at 04:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Zoho Mail Zoho ZeptoMail allows Stored XSS.This issue affects Zoho ZeptoMail: from n/a through 3.3.1. Cross-Site Request Forgery (CSRF) vulnerability in Zoho Mail Zoho ZeptoMail transmail allows Stored XSS.This issue affects Zoho ZeptoMail: from n/a through <= 3.3.1.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Zoho Mail
Zoho Mail zoho Zeptomail
Vendors & Products Wordpress
Wordpress wordpress
Zoho Mail
Zoho Mail zoho Zeptomail

Wed, 31 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 09:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Zoho Mail Zoho ZeptoMail allows Stored XSS.This issue affects Zoho ZeptoMail: from n/a through 3.3.1.
Title WordPress Zoho ZeptoMail plugin <= 3.3.1 - Cross Site Request Forgery (CSRF) to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
Zoho Mail Zoho Zeptomail
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:57.585Z

Reserved: 2025-05-30T14:04:14.278Z

Link: CVE-2025-49028

cve-icon Vulnrichment

Updated: 2025-12-31T15:23:11.448Z

cve-icon NVD

Status : Deferred

Published: 2025-12-31T09:15:50.830

Modified: 2026-04-23T15:31:11.400

Link: CVE-2025-49028

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T04:45:06Z

Weaknesses