Page 2 of 10 results (0.001 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

Auth. Path Traversal vulnerability in Easy WP SMTP plugin <= 1.5.1 at WordPress. Vulnerabilidad de Path Traversal autenticada en el complemento Easy WP SMTP en versiones &lt;= 1.5.1 en WordPress. The Easy WP SMTP plugin for WordPress is vulnerable to Arbitrary File Deletion versions up to, and including, 1.5.1. This is possibly due to the SMTP import/export functionality. • https://patchstack.com/database/vulnerability/easy-wp-smtp/wordpress-easy-wp-smtp-plugin-1-5-1-auth-arbitrary-file-deletion-vulnerability?_s_id=cve • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog. El complemento Easy WP SMTP de WordPress anterior a 1.5.0 deserializa el contenido de un archivo importado, lo que podría provocar un problema de inyección de objetos PHP cuando un administrador importa (intencionalmente o no) un archivo malicioso y una cadena de gadgets adecuada está presente en el blog. The Easy WP SMTP plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.9 via deserialization of untrusted input when processing the contents of an imported file. This allows administrator-level attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. • https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.1EPSS: 36%CPEs: 1EXPL: 1

The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there. El plugin easy-wp-smtp versiones anteriores a 1.4.4 para WordPress, permite una toma de control de la cuenta de administrador, como es explotado "in the wild" en diciembre de 2020. Si un atacante puede enumerar el directorio wp-content/plugins/easy-wp-smtp/, entonces puede detectar un archivo de registro (como ############# _ debug_log.txt) que contiene todos los enlaces de restablecimiento de contraseña. • https://blog.nintechnet.com/wordpress-easy-wp-smtp-plugin-fixed-zero-day-vulnerability https://wordpress.org/plugins/easy-wp-smtp/#developers https://wordpress.org/support/topic/security-issue-with-debug-log https://plugins.trac.wordpress.org/changeset/2432768/easy-wp-smtp • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts. • https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= https://wordpress.org/support/topic/vulnerability-26 https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve • CWE-862: Missing Authorization •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

XSS exists in Easy WP SMTP (before 1.2.5), a WordPress Plugin, via the e-mail subject or body. Existe XSS en Easy WP SMTP (en versiones anteriores a 1.2.5), un Plugin de WordPress, a través del asunto o cuerpo del correo electrónico. • https://wordpress.org/plugins/easy-wp-smtp/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •