Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43860 | The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account). |
Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpexperts post Smtp
|
|
| CPEs | cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpexperts post Smtp Mailer
|
Wpexperts post Smtp
|
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-07T14:18:23.148Z
Reserved: 2023-06-09T08:24:57.044Z
Link: CVE-2023-3179
Updated: 2024-08-02T06:48:08.071Z
Status : Modified
Published: 2023-07-17T14:15:10.843
Modified: 2025-06-04T15:05:06.540
Link: CVE-2023-3179
No data.
OpenCVE Enrichment
No data.
EUVD