cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forultimate-wp-mail ultimate-wp-mail

Direction: ascending
Apr 11, 2025

Ultimate WP Mail # CVE-2025-32694

CVE, Research URL

CVE-2025-32694

Application

Ultimate WP Mail

Date
Apr 09, 2025
Research Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Rustaurius Ultimate WP Mail allows Phishing. This issue affects Ultimate WP Mail: from n/a through 1.3.2.
Affected versions
Min -, max -.
Status
vulnerable
May 09, 2025

Ultimate WP Mail # CVE-2025-47466

CVE, Research URL

CVE-2025-47466

Application

Ultimate WP Mail

Date
May 07, 2025
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in Rustaurius Ultimate WP Mail allows Cross Site Request Forgery. This issue affects Ultimate WP Mail: from n/a through 1.3.4.
Affected versions
Min -, max -.
Status
vulnerable

Ultimate WP Mail # CVE-2025-47490

CVE, Research URL

CVE-2025-47490

Application

Ultimate WP Mail

Date
May 07, 2025
Research Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rustaurius Ultimate WP Mail allows SQL Injection. This issue affects Ultimate WP Mail: from n/a through 1.3.4.
Affected versions
Min -, max -.
Status
vulnerable
Jun 15, 2025

Ultimate WP Mail # CVE-2025-49288

CVE, Research URL

CVE-2025-49288

Application

Ultimate WP Mail

Date
Jun 06, 2025
Research Description
Missing Authorization vulnerability in Rustaurius Ultimate WP Mail allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ultimate WP Mail: from n/a through 1.3.5.
Affected versions
Min -, max -.
Status
vulnerable
Jul 18, 2025

Ultimate WP Mail # CVE-2025-6993

CVE, Research URL

CVE-2025-6993

Application

Ultimate WP Mail

Date
Jul 16, 2025
Research Description
The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.
Affected versions
Min -, max -.
Status
vulnerable