// For flags

CVE-2024-3073

Easy WP SMTP by SendLayer <= 2.3.0 - Exposure of Sensitive Information via the UI

Severity Score

2.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

The Easy WP SMTP by SendLayer – WordPress SMTP and Email Log Plugin plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.3.0. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment.

El complemento Easy WP SMTP de SendLayer – WordPress SMTP y Email Log Plugin para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 2.3.0 incluida. Esto se debe al complemento que proporciona la contraseña SMTP en el campo Contraseña SMTP al visualizar la configuración. Esto hace posible que atacantes autenticados, con acceso de nivel administrativo y superior, vean la contraseña SMTP del servidor proporcionado. Aunque esto no sería útil para los atacantes en la mayoría de los casos, si una cuenta de administrador se ve comprometida, esta podría ser información útil para un atacante en un entorno limitado.

*Credits: Andy Gilbert
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-28 CVE Reserved
  • 2024-06-12 CVE Published
  • 2024-06-14 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-257: Storing Passwords in a Recoverable Format
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wp-ecommerce
Search vendor "Wp-ecommerce"
Easy Wp Smtp
Search vendor "Wp-ecommerce" for product "Easy Wp Smtp"
< 2.3.1
Search vendor "Wp-ecommerce" for product "Easy Wp Smtp" and version " < 2.3.1"
wordpress
Affected