CVE-2019-25141

The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:39

Type Values Removed Values Added
References () https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - Exploit () https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - Exploit
References () https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - Patch
References () https://wordpress.org/support/topic/vulnerability-26/ - Exploit, Issue Tracking, Mitigation () https://wordpress.org/support/topic/vulnerability-26/ - Exploit, Issue Tracking, Mitigation
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - Broken Link, Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - Broken Link, Third Party Advisory

13 Jun 2023, 15:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Wp-ecommerce easy Wp Smtp
Wp-ecommerce
References (MISC) https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - (MISC) https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/ - Exploit
References (MISC) https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - (MISC) https://plugins.trac.wordpress.org/changeset?old_path=%2Feasy-wp-smtp&old=2052057&new_path=%2Feasy-wp-smtp&new=2052058&sfp_email=&sfph_mail= - Patch
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/84b75f7d-7258-46f6-aee6-b96d70bee264?source=cve - Broken Link, Third Party Advisory
References (MISC) https://wordpress.org/support/topic/vulnerability-26/ - (MISC) https://wordpress.org/support/topic/vulnerability-26/ - Exploit, Issue Tracking, Mitigation
CWE CWE-862
CPE cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*

07 Jun 2023, 02:45

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 02:15

Updated : 2024-11-21 04:39


NVD link : CVE-2019-25141

Mitre link : CVE-2019-25141

CVE.ORG link : CVE-2019-25141


JSON object : View

Products Affected

wp-ecommerce

  • easy_wp_smtp
CWE
CWE-862

Missing Authorization