Description
Cross-Site Request Forgery (CSRF) vulnerability in photoboxone SMTP Mail smtp-mail allows Cross Site Request Forgery.This issue affects SMTP Mail: from n/a through <= 1.3.51.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The SMTP Mail plugin for WordPress contains a Cross-Site Request Forgery flaw that allows an attacker to trick a logged-in administrator into unknowingly executing privileged actions on the site. Based on the description, it is inferred that the attacker targets an authenticated administrator via the plugin’s administrative endpoints. Because the vulnerability is not tied to a specific input value, an attacker can manipulate the typical "settings" or "send test email" endpoints to alter configuration, potentially redirecting mail flow or exposing credentials. This constitutes a loss of integrity for site administrators, with indirect implications for confidentiality if configuration changes expose sensitive data. The vulnerability does not provide direct remote code execution or denial of service but can enable unauthorized changes to the host environment.

Affected Systems

The flaw affects the photoboxone "SMTP Mail" plugin for WordPress. All releases from the earliest release through version 1.3.51 are vulnerable. No specific sub-version details are available beyond the upper bound of 1.3.51.

Risk and Exploitability

Based on the description, it is inferred that attackers would attempt to exploit the vulnerability via a crafted link or script that loads the plugin’s administrative URL in an authenticated session. The CVSS score of 4.3 indicates a moderate severity level, while the EPSS < 1% signals a very low likelihood that the vulnerability is actively exploited. The plugin is not listed in the CISA KEV catalog, further suggesting that no widespread exploitation has been reported. Attackers are likely to exploit the issue via a crafted link or script that loads the plugin’s administrative URL in an authenticated session, taking advantage of a missing CSRF token in the request, a typical CWE-352 Cross-Site Request Forgery weakness.

Generated by OpenCVE AI on April 30, 2026 at 14:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the SMTP Mail plugin to a version newer than 1.3.51.
  • If an immediate update is not possible, limit the administrative interface to trusted IP addresses or enforce MFA on the WordPress admin login to reduce the pool of users who could be tricked into executing the malicious request.
  • Use a Web Application Firewall or plugin that blocks unauthorized POST requests to the SMTP Mail configuration endpoints, and monitor site logs for anomalous access patterns targeting these URLs.

Generated by OpenCVE AI on April 30, 2026 at 14:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in photoboxone SMTP Mail smtp-mail allows Cross Site Request Forgery.This issue affects SMTP Mail: from n/a through <= 1.3.47. Cross-Site Request Forgery (CSRF) vulnerability in photoboxone SMTP Mail smtp-mail allows Cross Site Request Forgery.This issue affects SMTP Mail: from n/a through <= 1.3.51.
Title WordPress SMTP Mail plugin <= 1.3.47 - Cross Site Request Forgery (CSRF) vulnerability WordPress SMTP Mail plugin <= 1.3.51 - Cross Site Request Forgery (CSRF) vulnerability

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Photoboxone
Photoboxone smtp Mail
Wordpress
Wordpress wordpress
Vendors & Products Photoboxone
Photoboxone smtp Mail
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in photoboxone SMTP Mail smtp-mail allows Cross Site Request Forgery.This issue affects SMTP Mail: from n/a through <= 1.3.47.
Title WordPress SMTP Mail plugin <= 1.3.47 - Cross Site Request Forgery (CSRF) vulnerability
Weaknesses CWE-352
References

Subscriptions

Photoboxone Smtp Mail
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:04.343Z

Reserved: 2025-10-21T14:59:54.790Z

Link: CVE-2025-62762

cve-icon Vulnrichment

Updated: 2025-12-10T22:04:32.689Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:03.027

Modified: 2026-04-23T15:34:41.757

Link: CVE-2025-62762

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:45:24Z

Weaknesses