CybersecurityNewswireTechnologyWhat's Buzzing

Critical SMTP Plugin Flaw Puts 200K WordPress Sites at Risk

▼ Summary

– Over 200,000 WordPress websites are using a vulnerable version of the Post SMTP plugin, exposing them to administrator account takeovers.
– The vulnerability (CVE-2025-24000) affects all Post SMTP versions up to 3.2.0 due to insufficient access control in REST API endpoints.
– Low-privileged users, like Subscribers, could exploit the flaw to access email logs and hijack Administrator accounts via password resets.
– The developer released a fix in version 3.3.0 on June 11, adding permission checks to sensitive API calls.
– Only 48.5% of users have updated to the secure version, leaving over 200,000 sites vulnerable, with 24.2% still on older, riskier 2.x versions.

A critical vulnerability in the widely used Post SMTP plugin has exposed over 200,000 WordPress websites to potential administrator account takeovers. The flaw, tracked as CVE-2025-24000, allows attackers with minimal privileges to access sensitive email logs and hijack high-level accounts.

Post SMTP, a popular alternative to WordPress’ default email system, boasts more than 400,000 active installations. The plugin enhances email reliability and functionality, making it a preferred choice for many site owners. However, versions prior to 3.3.0 contain a serious security gap in their REST API endpoints.

The vulnerability stems from inadequate access controls. Instead of verifying user permissions, the plugin only checked whether a user was logged in. This oversight meant even low-level subscribers could view email logs containing confidential content, including password reset links. Attackers exploiting this flaw could intercept administrator emails, reset passwords, and seize control of entire websites.

Security researchers at PatchStack identified the issue on May 23 and alerted the developer, Saad Iqbal. A patch was submitted for review three days later, introducing stricter permission checks in the `getlogspermission` function. The fix was officially released in version 3.3.0 on June 11.

Despite the update, nearly half of Post SMTP users (48.5%) remain unprotected, still running outdated versions. Even more concerning, roughly 96,800 sites operate on vulnerable 2.x branch releases, exposing them to additional security risks.

Website administrators are urged to immediately update to Post SMTP 3.3.0 or later to mitigate the threat. Delaying patches could leave sites open to exploitation, risking data breaches and unauthorized access. Regularly monitoring plugin updates remains essential for maintaining robust security in WordPress environments.

(Source: BLEEPING COMPUTER)

Topics

wordpress post smtp plugin vulnerability 95% cve-2025-24000 90% administrator account takeover 85% insufficient access control 80% email log exposure 75% patch release version 330 70% update adoption rates 65% security recommendations 60%