Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations

Posted on July 28, 2025July 28, 2025 By CWS

A vulnerability in a well-liked e-mail supply WordPress plugin is affected by a essential vulnerability that may be exploited to take full management of affected web sites. 

The impacted plugin is Submit SMTP, which is actively used on greater than 400,000 WordPress web sites for sending emails. 

A researcher found in Might that the plugin is affected by a severe damaged entry management difficulty permitting any registered person, together with subscribers, to achieve entry to delicate information. The safety gap is tracked as CVE-2025-24000.

In line with WordPress safety agency Patchstack, which coordinated the disclosure of the flaw, an attacker can exploit the vulnerability to view e-mail statistics, resend emails, and entry e-mail logs, which embrace the physique of the e-mail.

These e-mail logs can embrace password reset emails despatched to any person, together with directors, which permits the attacker to reset the password for such accounts and take full management of the focused web site. 

Submit SMTP builders patched the vulnerability on June 11 with the discharge of model 3.3.

Information from Submit SMTP’s statistics web page on WordPress.org reveals that lower than half of the greater than 400,000 lively installations have been up to date to model 3.3, which signifies that greater than 200,000 web sites should be weak to assaults.

It’s vital that WordPress web site directors preserve their plugins updated as risk actors typically exploit plugin and theme vulnerabilities to hack websites. Commercial. Scroll to proceed studying.

Associated: Hackers Inject Malware Into Gravity Kinds WordPress Plugin

Associated: Forminator WordPress Plugin Vulnerability Exposes 400,000 Web sites to Takeover

Associated: Second OttoKit Vulnerability Exploited to Hack WordPress Websites

Security Week News Tags:400k, Allowing, Flaw, Installations, Plugin, Takeover, Website, WordPress

Post navigation

Previous Post: LG Innotek Camera Vulnerabilities Let Attackers Gain Administrative Access
Next Post: Hackers Compromise Intelligence Website Used by CIA and Other Agencies

Related Posts

Sensitive Information Stolen in Sensata Ransomware Attack Security Week News
WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says Security Week News
Australian Human Rights Commission Discloses Data Breach Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine Security Week News
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News