Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks

Posted on November 5, 2025November 5, 2025 By CWS

A essential safety flaw within the WordPress Put up SMTP plugin has left greater than 400,000 web sites weak to account takeover assaults.

The vulnerability, recognized as CVE-2025-11833, permits unauthenticated attackers to entry e-mail logs containing delicate password reset info, doubtlessly compromising administrator accounts and full web sites.

The flaw stems from a lacking authorization verify within the plugin’s core performance, permitting risk actors to take advantage of logged e-mail information with out requiring any authentication credentials.

The Put up SMTP plugin, designed to interchange WordPress’s default PHP mail operate with SMTP mailers, contains an e-mail logging function that inadvertently exposes essential safety info.

Since November 1, 2025, attackers have actively focused this vulnerability, with over 4,500 exploitation makes an attempt already blocked by safety techniques.

The widespread use of this plugin throughout tons of of hundreds of WordPress installations has created a major assault floor for cybercriminals searching for unauthorized entry to web sites.

Wordfence researchers recognized the vulnerability by means of their Bug Bounty Program on October 11, 2025, simply sooner or later after its introduction.

Safety researcher netranger found and responsibly reported the flaw, incomes a bounty of $7,800 for the essential discovering.

The WP Consultants improvement group responded swiftly to disclosure, releasing patch model 3.6.1 on October 29, 2025, to handle the safety hole affecting all variations as much as and together with 3.6.0.

The vulnerability carries a CVSS rating of 9.8, inserting it within the essential severity class. Web site directors should instantly replace to model 3.6.1 to guard their installations from ongoing exploitation makes an attempt.

Wordfence Premium customers obtained firewall safety on October 15, 2025, whereas free model customers will obtain the identical safeguards by November 14, 2025.

Technical Exploitation Mechanism

The vulnerability resides throughout the PostmanEmailLogs class constructor, which shows logged e-mail messages with out performing functionality checks on the __construct operate.

Attackers can exploit this weak spot by manipulating URL parameters to entry arbitrary e-mail logs by means of the plugin’s interface.

Vulnerability Particulars:-

ParameterDetailsCVE IDCVE-2025-11833CVSS Score9.8 (Crucial)Vulnerability TypeMissing Authorization to Account Takeover through Unauthenticated E-mail Log DisclosureAffected PluginPost SMTP – Full SMTP Resolution with Logs, Alerts, Backup SMTP & Cell AppAffected VersionsAll variations Patched Version3.6.1Active Installations400,000+Discovery DateOctober 11, 2025Patch Launch DateOctober 29, 2025Researchernetranger (Wordfence Bug Bounty Program)Bounty Awarded$7,800.00Exploitation StatusActive (4,500+ assaults blocked as of November 1, 2025)

The weak code accepts GET requests with particular parameters together with web page, view, and log_id, permitting unauthorized customers to retrieve saved e-mail content material straight from the database.

public operate __construct() {
international $wpdb;
$this->db = $wpdb;
$this->logger = new PostmanLogger( get_class( $this ) );

//Render Message physique in iframe
if(
isset( $_GET[‘page’] ) && $_GET[‘page’] == ‘postman_email_log’
&&
isset( $_GET[‘view’] ) && $_GET[‘view’] == ‘log’
&&
isset( $_GET[‘log_id’] ) && !empty( $_GET[‘log_id’] )
) {
$id = sanitize_text_field( $_GET[‘log_id’] );
$email_query_log = new PostmanEmailQueryLog();
$log = $email_query_log->get_log( $id, ” );
echo ( isset ( $header ) && strpos( $header, “textual content/html” ) );
die;
}
}

The exploitation course of includes attackers triggering password reset requests for administrator accounts, then accessing the logged reset emails containing password reset hyperlinks by means of the unprotected interface.

This two-step assault vector permits full web site takeover, granting malicious actors full administrative privileges to add backdoors, modify content material, and redirect customers to malicious locations.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attacks, Exposes, Plugin, Post, SMTP, Takeover, Vulnerability, Websites, WordPress

Post navigation

Previous Post: 5 Actionable Tactics for SOC Analysts
Next Post: HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Related Posts

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Cyber Security News
Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Cyber Security News
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform Cyber Security News
Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily Cyber Security News
Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
  • 239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times
  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover 
  • Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
  • 239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times
  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News