CVE-2019-25141

The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*

History

13 Jun 2023, 15:41

Type Values Removed Values Added
CPE cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*
References (MISC) https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - (MISC) https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - Patch
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - Broken Link, Third Party Advisory
References (MISC) https://wordpress.org/support/topic/vulnerability-26/ - (MISC) https://wordpress.org/support/topic/vulnerability-26/ - Exploit, Issue Tracking, Mitigation
References (MISC) https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - (MISC) https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - Exploit
CWE CWE-862
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

07 Jun 2023, 02:45

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 02:15

Updated : 2024-02-04 23:37


NVD link : CVE-2019-25141

Mitre link : CVE-2019-25141

CVE.ORG link : CVE-2019-25141


JSON object : View

Products Affected

wp-ecommerce

  • easy_wp_smtp
CWE
CWE-862

Missing Authorization