cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forpost-smtp post-smtp

Direction: descending
Jul 25, 2025

POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2025-24000

CVE, Research URL

CVE-2025-24000

Date
-
Research Description
Post SMTP &#8211; WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications &#8211; Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more [post-smtp] < 3.3.0 CVE-2025-24000
Affected versions
Min -, max -.
Status
vulnerable
Mar 09, 2025

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2024-13844

CVE, Research URL

CVE-2024-13844

Date
Mar 08, 2025
Research Description
The Post SMTP plugin for WordPress is vulnerable to generic SQL Injection via the ‘columns’ parameter in all versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable
Feb 21, 2025

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2025-0521

CVE, Research URL

CVE-2025-0521

Date
Feb 18, 2025
Research Description
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable
Jan 11, 2025

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2025-22800

CVE, Research URL

CVE-2025-22800

Date
Jan 13, 2025
Research Description
Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.
Affected versions
Min -, max -.
Status
vulnerable
Nov 18, 2024

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2024-52436

CVE, Research URL

CVE-2024-52436

Date
Nov 18, 2024
Research Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Post SMTP allows Blind SQL Injection.This issue affects Post SMTP: from n/a through 2.9.9.
Affected versions
Min -, max -.
Status
vulnerable
Jul 10, 2024

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-52233

CVE, Research URL

CVE-2023-52233

Date
Jun 11, 2024
Research Description
Missing Authorization vulnerability in Post SMTP Post SMTP Mailer/Email Log.This issue affects Post SMTP Mailer/Email Log: from n/a through 2.8.6.
Affected versions
Min -, max -.
Status
vulnerable
Jun 07, 2024

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-3179

CVE, Research URL

CVE-2023-3179

Date
Jul 17, 2023
Research Description
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2022-2352

CVE, Research URL

CVE-2022-2352

Date
Sep 26, 2022
Research Description
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.7 does not have proper authorisation in some AJAX actions, which could allow high privilege users such as admin to perform blind SSRF on multisite installations for example.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2021-4422

CVE, Research URL

CVE-2021-4422

Date
Jul 12, 2023
Research Description
The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-3082

CVE, Research URL

CVE-2023-3082

Date
Jul 12, 2023
Research Description
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # 179cffb63c8e1b85d66a822530b8c79e67772995

Date
Feb 11, 2021
Research Description
Post SMTP &#8211; WP SMTP Plugin with Email Logs and Mobile App for Failure Notifications &#8211; Gmail SMTP, Office 365, Brevo, Mailgun, Amazon SES and more [post-smtp] < 2.0.21 WordPress Post SMTP Mailer/Email Log plugin <= 2.0.20 - Cross-Site Request Forgery (CSRF) nonce validation vulnerability Cross-Site Request Forgery (CSRF) nonce validation vulnerability found in WordPress Post SMTP Mailer/Email Log plugin (versions <= 2.0.20).
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-3178

CVE, Research URL

CVE-2023-3178

Date
Jan 16, 2024
Research Description
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2022-2351

CVE, Research URL

CVE-2022-2351

Date
Sep 16, 2022
Research Description
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.4 does not escape some of its settings before outputting them in the admins dashboard, allowing high privilege users to perform Cross-Site Scripting attacks against other users even when the unfiltered_html capability is disallowed.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2024-29128

CVE, Research URL

CVE-2024-29128

Date
Mar 19, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Post SMTP POST SMTP allows Reflected XSS.This issue affects POST SMTP: from n/a through 2.8.6.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2024-5207

CVE, Research URL

CVE-2024-5207

Date
May 30, 2024
Research Description
The POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications plugin for WordPress is vulnerable to time-based SQL Injection via the selected parameter in all versions up to, and including, 2.9.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator access or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-7027

CVE, Research URL

CVE-2023-7027

Date
Jan 03, 2024
Research Description
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-6620

CVE, Research URL

CVE-2023-6620

Date
Jan 15, 2024
Research Description
The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-6621

CVE, Research URL

CVE-2023-6621

Date
Jan 03, 2024
Research Description
The POST SMTP WordPress plugin before 2.8.7 does not sanitise and escape the msg parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-5958

CVE, Research URL

CVE-2023-5958

Date
Nov 27, 2023
Research Description
The POST SMTP Mailer WordPress plugin before 2.7.1 does not escape email message content before displaying it in the backend, allowing an unauthenticated attacker to perform XSS attacks against highly privileged users.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-6629

CVE, Research URL

CVE-2023-6629

Date
Jan 03, 2024
Research Description
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘msg’ parameter in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

POST SMTP &#8211; The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications # CVE-2023-6875

CVE, Research URL

CVE-2023-6875

Date
Jan 11, 2024
Research Description
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.
Affected versions
Min -, max -.
Status
vulnerable