The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Saadiqbal
         Saadiqbal post Smtp Wordpress Wordpress wordpress  | 
|
| Vendors & Products | 
        
        Saadiqbal
         Saadiqbal post Smtp Wordpress Wordpress wordpress  | 
Sat, 01 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover. | |
| Title | Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App <= 3.6.0 - Missing Authorization to Account Takeover via Unauthenticated Email Log Disclosure | |
| Weaknesses | CWE-862 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-03T15:47:23.380Z
Reserved: 2025-10-15T19:10:23.277Z
Link: CVE-2025-11833
Updated: 2025-11-03T15:47:19.012Z
Status : Received
Published: 2025-11-01T04:15:42.660
Modified: 2025-11-01T04:15:42.660
Link: CVE-2025-11833
No data.