Impact
The vulnerability is a REST API endpoint in the Gravity SMTP WordPress plugin that is allowed to be called by any visitor because its permission callback always returns true. When a requester adds the query parameter ?page=gravitysmtp-settings, the plugin sends back a large JSON string containing a full system report. The data includes the PHP version, loaded extensions, web server and database details, WordPress core and plugin versions, active theme, configuration settings, database table names, and any API keys or tokens configured in the plugin. Unauthenticated attackers can therefore obtain sensitive configuration and credential information that could enable further exploitation.
Affected Systems
All WordPress sites using the Gravity SMTP plugin version 2.1.4 or earlier are affected. The plugin is distributed by RocketGenius and the flaw exists in every build up to and including the 2.1.4 release.
Risk and Exploitability
The CVSS score of 7.5 marks this issue as high severity, and though EPSS data is unavailable and the vulnerability is not listed in CISA's KEV catalog, the attack vector remains unauthenticated via a public REST endpoint. Because no authentication is required, an attacker can simply issue an HTTP GET request and receive privileged configuration data, making the vulnerability both easy to exploit and of significant value. Administrators should consider this a high‑risk threat until the plugin is patched.
OpenCVE Enrichment