The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Wpexperts post Smtp | |
| CPEs | cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Wpexperts post Smtp Mailer | Wpexperts post Smtp | 
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-352 | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: WPScan
Published: 2023-07-17T13:29:54.425Z
Updated: 2024-11-07T14:18:23.148Z
Reserved: 2023-06-09T08:24:57.044Z
Link: CVE-2023-3179
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T06:48:08.071Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-07-17T14:15:10.843
Modified: 2025-06-04T15:05:06.540
Link: CVE-2023-3179
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow