CVE-2020-35234
HIGH EXPLOITED IN THE WILD NUCLEIWp-ecommerce Easy WP SMTP < 1.4.4 - Log Information Exposure
Title source: ruleDescription
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.
Exploits (1)
metasploit
WORKING POC
by h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_easy_wp_smtp.rb
Nuclei Templates (1)
SMTP WP Plugin Directory Listing
HIGHby PR3R00T
Scores
CVSS v3
7.5
EPSS
0.8146
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2020-12-13
InTheWild.io
2020-12-15
CWE
CWE-532
Status
published
Products (1)
wp-ecommerce/easy_wp_smtp
< 1.4.4
Published
Dec 14, 2020
Tracked Since
Feb 18, 2026