CVE-2023-6875
CRITICAL EXPLOITED NUCLEIWordpress POST SMTP Account Takeover
Title source: metasploitDescription
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.
Exploits (4)
nomisec
WORKING POC
25 stars
by UlyssesSaicha · remote
https://github.com/UlyssesSaicha/CVE-2023-6875
nomisec
WORKING POC
1 stars
by hatlesswizard · remote
https://github.com/hatlesswizard/CVE-2023-6875
metasploit
WORKING POC
by h00die, Ulysses Saicha · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/wp_post_smtp_acct_takeover.rb
Nuclei Templates (1)
WordPress POST SMTP Mailer <= 2.8.7 - Authorization Bypass
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.html:/wp-content/plugins/post-smtp
FOFA:
body=/wp-content/plugins/post-smtp
References (4)
Scores
CVSS v3
9.8
EPSS
0.9368
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-01-10
Classification
CWE
CWE-862
Status
published
Affected Products (1)
wpexperts/post_smtp
< 2.8.7
Timeline
Published
Jan 11, 2024
Tracked Since
Feb 18, 2026