Description
The PostmarkApp Email Integrator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in versions up to, and including, 2.4. This is due to insufficient input sanitization and output escaping on the pma_api_key and pma_sender_address parameters. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page.
Published: 2026-02-19
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The PostmarkApp Email Integrator plugin for WordPress is vulnerable to stored Cross‑Site Scripting in its pma_api_key and pma_sender_address fields because the input from these fields is not properly sanitized or escaped. An attacker who has Administrator‑level access can inject arbitrary JavaScript into the plugin settings. When any user, even one without administrative rights, visits the settings page, the injected script executes in that user’s browser, potentially allowing the attacker to steal credentials, deface the site, or perform other malicious actions within the user’s session context.

Affected Systems

The vulnerability affects installations of the PostmarkApp Email Integrator plugin developed by gagan0123, specifically all versions up to and including 2.4.

Risk and Exploitability

The CVSS score of 4.4 indicates a medium impact rating, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to have authenticated Administrator‑level access; the attack vector, therefore, is an authenticated privilege escalation within the WordPress installation. Once the attacker injects script into the plugin settings, the script will run automatically for any user who views that page.

Generated by OpenCVE AI on April 15, 2026 at 20:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PostmarkApp Email Integrator plugin to the latest version that removes the insecure input handling.
  • If an immediate upgrade is not feasible, restrict or remove Administrator‑level access to the plugin’s settings page to prevent new script injections.
  • Configure a Content Security Policy that blocks inline scripts and does not allow execution from untrusted sources, and enable the browser’s XSS filter or a web application firewall to detect and block malicious payloads.

Generated by OpenCVE AI on April 15, 2026 at 20:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Gagan0123
Gagan0123 postmarkapp Email Integrator
Wordpress
Wordpress wordpress
Vendors & Products Gagan0123
Gagan0123 postmarkapp Email Integrator
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The PostmarkApp Email Integrator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in versions up to, and including, 2.4. This is due to insufficient input sanitization and output escaping on the pma_api_key and pma_sender_address parameters. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the settings page.
Title PostmarkApp Email Integrator <= 2.4 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Settings
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Gagan0123 Postmarkapp Email Integrator
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:37.150Z

Reserved: 2026-01-16T15:53:22.420Z

Link: CVE-2026-1043

cve-icon Vulnrichment

Updated: 2026-02-19T20:36:03.272Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:42.900

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:30:13Z

Weaknesses