Description
The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).
Published: 2026-04-22
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass allowing SMTP hijack and email interception
Action: Immediate Patch
AI Analysis

Impact

The Sendmachine for WordPress plugin suffers from a missing authorization check in the manage_admin_requests function. An attacker who can reach the plugin’s admin endpoint without authentication can overwrite the SMTP settings. This capability enables the attacker to intercept all outgoing emails, including password reset mails, effectively allowing credential theft and facilitating further phishing or social engineering campaigns.

Affected Systems

Sendmachine for WordPress plugin, any installed version up to and including 1.0.20.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.8, indicating critical severity. Exploitation requires no authentication and can be performed from any network scope that can reach the WordPress admin interface. While an EPSS score is not available, the absence of a KEV listing does not diminish the seriousness of the flaw. Given the high impact and straightforward attack vector, the risk of exploitation is considered significant, especially on publicly exposed sites.

Generated by OpenCVE AI on April 22, 2026 at 09:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Sendmachine plugin to the latest available version, which removes the authorization bypass in manage_admin_requests.
  • If an update is not yet released, temporarily deactivate the Sendmachine plugin to prevent unauthorized SMTP configuration changes.
  • Restrict access to the WordPress administrative dashboard to trusted IP addresses and enforce two‑factor authentication for administrators to mitigate potential future abuse.

Generated by OpenCVE AI on April 22, 2026 at 09:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Sendmachine
Sendmachine sendmachine For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Sendmachine
Sendmachine sendmachine For Wordpress
Wordpress
Wordpress wordpress

Wed, 22 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Description The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).
Title Sendmachine for WordPress <= 1.0.20 - Unauthenticated SMTP Hijack to Privilege Escalation via manage_admin_requests
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Sendmachine Sendmachine For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-22T07:45:37.881Z

Reserved: 2026-04-13T16:12:01.215Z

Link: CVE-2026-6235

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-04-22T09:16:26.263

Modified: 2026-04-22T20:22:50.570

Link: CVE-2026-6235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:44:04Z

Weaknesses