{"id":2986,"date":"2025-07-29T07:28:52","date_gmt":"2025-07-29T07:28:52","guid":{"rendered":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=2986"},"modified":"2025-07-29T07:30:00","modified_gmt":"2025-07-29T07:30:00","slug":"post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks","status":"publish","type":"page","link":"https:\/\/cert-mu.govmu.org\/cert-mu\/?page_id=2986","title":{"rendered":"Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2986\" class=\"elementor elementor-2986\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9a0b931 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a0b931\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-685cdf8\" data-id=\"685cdf8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df8bbc7 elementor-widget elementor-widget-text-editor\" data-id=\"df8bbc7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More than 200,000 WordPress websites are using a vulnerable version of the Post SMTP plugin that allows hackers to take control of the administrator account.<\/p><p>Post SMTP is a popular email delivery plugin for WordPress that counts more than 400,000 active installations. It\u2019s marketed as a replacement of the default \u2018wp_mail()\u2019 function that is more reliable and feature-rich.<\/p><p>On May 23, a security researcher reported the vulnerability to WordPress security firm PatchStack. The flaw is now identified as CVE-2025-24000 and received a medium severity score of 8.8. The security issue affects all versions of Post SMTP up to 3.2.0 and is due to a broken access control mechanism in the plugin\u2019s REST API endpoints, which only verified if a user was logged in, without checking their permission level.<\/p><p>This means that low-privileged users, such as Subscribers, could access email logs containing full email content. On vulnerable sites, a subscriber could initiate a password reset for an Administrator account, intercept the reset email via the logs, and gain control of the account.<\/p><p><strong>Read More: <\/strong><\/p><p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>More than 200,000 WordPress websites are using a vulnerable version of the Post SMTP plugin that allows hackers to take control of the administrator account. Post SMTP is a popular email delivery plugin for WordPress that counts more than 400,000 active installations. It\u2019s marketed as a replacement of the default \u2018wp_mail()\u2019 function that is more reliable and feature-rich. On May 23, a security researcher reported the vulnerability to WordPress security firm PatchStack. The flaw is now identified as CVE-2025-24000 and received a medium severity score of 8.8. The security issue affects all versions of Post SMTP up to 3.2.0 and\u2026<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2986","page","type-page","status-publish","hentry"],"blocksy_meta":"","_links":{"self":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/2986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2986"}],"version-history":[{"count":4,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/2986\/revisions"}],"predecessor-version":[{"id":2993,"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=\/wp\/v2\/pages\/2986\/revisions\/2993"}],"wp:attachment":[{"href":"https:\/\/cert-mu.govmu.org\/cert-mu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}