The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 20 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Wpexperts post Smtp | |
| CPEs | cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Wpexperts post Smtp Mailer | Wpexperts post Smtp | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: WPScan
Published: 2024-01-15T15:10:41.386Z
Updated: 2025-06-20T16:52:48.813Z
Reserved: 2023-12-08T10:30:24.389Z
Link: CVE-2023-6620
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T08:35:14.814Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-01-15T16:15:12.513
Modified: 2025-06-20T17:15:39.273
Link: CVE-2023-6620
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow