Impact
The ShopLentor WooCommerce Builder for Elementor & Gutenberg plugin is vulnerable to an unauthenticated email relay abuse in all releases up to 3.3.2 due to missing validation on the send_to, product_title, wlmessage, and wlemail parameters within the woolentor_suggest_price_action AJAX endpoint, which allows an attacker to inject CRLF sequences in wlemail to forge arbitrary From headers, control subject and body, therefore turning the WordPress site into a full email relay for spam or phishing campaigns.
Affected Systems
The flaw affects the devitemsllc:ShopLentor All-in-One WooCommerce Growth & Store Enhancement Plugin for WordPress in versions 3.3.2 and earlier, located in the class.ajax_actions.php file’s woolentor_suggest_price_action action; users on these releases should upgrade promptly.
Risk and Exploitability
With a CVSS score of 8.6 and an EPSS score less than 1%, the vulnerability is high severity yet low exploitation probability; the attack can be performed remotely without authentication by sending a crafted POST request to wp-admin/admin-ajax.php?action=woolentor_suggest_price_action, making rapid remediation critical to prevent mass email abuse.
OpenCVE Enrichment