Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks

Posted on November 5, 2025November 5, 2025 By CWS

A essential safety flaw within the WordPress Put up SMTP plugin has left greater than 400,000 web sites weak to account takeover assaults.

The vulnerability, recognized as CVE-2025-11833, permits unauthenticated attackers to entry e-mail logs containing delicate password reset info, doubtlessly compromising administrator accounts and full web sites.

The flaw stems from a lacking authorization verify within the plugin’s core performance, permitting risk actors to take advantage of logged e-mail information with out requiring any authentication credentials.

The Put up SMTP plugin, designed to interchange WordPress’s default PHP mail operate with SMTP mailers, contains an e-mail logging function that inadvertently exposes essential safety info.

Since November 1, 2025, attackers have actively focused this vulnerability, with over 4,500 exploitation makes an attempt already blocked by safety techniques.

The widespread use of this plugin throughout tons of of hundreds of WordPress installations has created a major assault floor for cybercriminals searching for unauthorized entry to web sites.

Wordfence researchers recognized the vulnerability by means of their Bug Bounty Program on October 11, 2025, simply sooner or later after its introduction.

Safety researcher netranger found and responsibly reported the flaw, incomes a bounty of $7,800 for the essential discovering.

The WP Consultants improvement group responded swiftly to disclosure, releasing patch model 3.6.1 on October 29, 2025, to handle the safety hole affecting all variations as much as and together with 3.6.0.

The vulnerability carries a CVSS rating of 9.8, inserting it within the essential severity class. Web site directors should instantly replace to model 3.6.1 to guard their installations from ongoing exploitation makes an attempt.

Wordfence Premium customers obtained firewall safety on October 15, 2025, whereas free model customers will obtain the identical safeguards by November 14, 2025.

Technical Exploitation Mechanism

The vulnerability resides throughout the PostmanEmailLogs class constructor, which shows logged e-mail messages with out performing functionality checks on the __construct operate.

Attackers can exploit this weak spot by manipulating URL parameters to entry arbitrary e-mail logs by means of the plugin’s interface.

Vulnerability Particulars:-

ParameterDetailsCVE IDCVE-2025-11833CVSS Score9.8 (Crucial)Vulnerability TypeMissing Authorization to Account Takeover through Unauthenticated E-mail Log DisclosureAffected PluginPost SMTP – Full SMTP Resolution with Logs, Alerts, Backup SMTP & Cell AppAffected VersionsAll variations Patched Version3.6.1Active Installations400,000+Discovery DateOctober 11, 2025Patch Launch DateOctober 29, 2025Researchernetranger (Wordfence Bug Bounty Program)Bounty Awarded$7,800.00Exploitation StatusActive (4,500+ assaults blocked as of November 1, 2025)

The weak code accepts GET requests with particular parameters together with web page, view, and log_id, permitting unauthorized customers to retrieve saved e-mail content material straight from the database.

public operate __construct() {
international $wpdb;
$this->db = $wpdb;
$this->logger = new PostmanLogger( get_class( $this ) );

//Render Message physique in iframe
if(
isset( $_GET[‘page’] ) && $_GET[‘page’] == ‘postman_email_log’
&&
isset( $_GET[‘view’] ) && $_GET[‘view’] == ‘log’
&&
isset( $_GET[‘log_id’] ) && !empty( $_GET[‘log_id’] )
) {
$id = sanitize_text_field( $_GET[‘log_id’] );
$email_query_log = new PostmanEmailQueryLog();
$log = $email_query_log->get_log( $id, ” );
echo ( isset ( $header ) && strpos( $header, “textual content/html” ) );
die;
}
}

The exploitation course of includes attackers triggering password reset requests for administrator accounts, then accessing the logged reset emails containing password reset hyperlinks by means of the unprotected interface.

This two-step assault vector permits full web site takeover, granting malicious actors full administrative privileges to add backdoors, modify content material, and redirect customers to malicious locations.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Account, Attacks, Exposes, Plugin, Post, SMTP, Takeover, Vulnerability, Websites, WordPress

Post navigation

Previous Post: 5 Actionable Tactics for SOC Analysts
Next Post: HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Related Posts

Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands Cyber Security News
Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
North Korean Kimsuky Hackers Leveraged GitHub to Attack Foreign Embassies with XenoRAT Malware Cyber Security News
Microsoft Fixes Windows 11 24H2 Audio Issue that Stops Bluetooth Headsets and Speakers Working Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User
  • US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency
  • CISA Warns of CWP Vulnerability Exploited in the Wild
  • CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
  • HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News