.. / CVE-2023-6875

Exploit for WordPress POST SMTP Mailer <= 2.8.7 - Authorization Bypass (CVE-2023-6875)

Description:

The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7.

Nuclei Template

View the template here CVE-2023-6875.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-6875.yaml
Copy

References:

https://plugins.trac.wordpress.org/changeset/3016051/post-smtp/trunk?contextall=1&old=3012318&old_path=%2Fpost-smtp%2Ftrunk
https://www.wordfence.com/threat-intel/vulnerabilities/id/e675d64c-cbb8-4f24-9b6f-2597a97b49af?source=cve
https://nvd.nist.gov/vuln/detail/CVE-2023-6875
https://github.com/UlyssesSaicha/CVE-2023-6875
https://plugins.trac.wordpress.org/browser/post-smtp/trunk/Postman/Mobile/includes/rest-api/v1/rest-api.php#L60