The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 02 Aug 2025 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Rustaurius
Rustaurius ultimate Wp Mail
CPEs cpe:2.3:a:rustaurius:ultimate_wp_mail:*:*:*:*:*:wordpress:*:*
Vendors & Products Rustaurius
Rustaurius ultimate Wp Mail

Wed, 16 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0004}


Wed, 16 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.
Title Ultimate WP Mail 1.0.17 - 1.3.6 - Missing Authorization to Authenticated (Contributor+) Privilege Escalation via get_email_log_details Function
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-07-16T14:40:19.407Z

Reserved: 2025-07-01T21:34:52.393Z

Link: CVE-2025-6993

cve-icon Vulnrichment

Updated: 2025-07-16T13:30:32.459Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-16T10:15:29.297

Modified: 2025-08-02T01:29:41.363

Link: CVE-2025-6993

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.