WP Mail SMTP by WPForms Vulnerability – Authenticated (Admin+) SMTP Password Exposure – CVE-2024-6694 | WordPress Plugin Vulnerability Report
Plugin Name: WP Mail SMTP by WPForms – The Most Popular SMTP and Email Log Plugin
Key Information:
- Software Type: Plugin
- Software Slug: wp-mail-smtp
- Software Status: Active
- Software Author: smub
- Software Downloads: 54,987,682
- Active Installs: 3,000,000
- Last Updated: July 29, 2024
- Patched Versions: 4.1.0
- Affected Versions: <= 4.0.1
Vulnerability Details:
- Name: WP Mail SMTP <= 4.0.1
- Type: Authenticated (Admin+) SMTP Password Exposure
- CVE: CVE-2024-6694
- CVSS Score: 2.7
- Publicly Published: July 19, 2024
- Researcher: Guus Verbeek
- Description: The WP Mail SMTP plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 4.0.1. This vulnerability is due to the plugin displaying the SMTP password in the settings interface, making it visible to authenticated users with administrative access. This exposure could be potentially useful to attackers if an administrator account is compromised.
Summary:
The WP Mail SMTP plugin for WordPress has a vulnerability in versions up to and including 4.0.1 that allows for the exposure of SMTP passwords to authenticated users with administrative-level access. This vulnerability has been patched in version 4.1.0.
Detailed Overview:
The vulnerability was identified by researcher Guus Verbeek and involves the exposure of SMTP passwords in the settings interface of the WP Mail SMTP plugin. This issue arises because the plugin provides the SMTP password in plain text, visible to users with admin-level access. While this vulnerability requires authenticated access, it poses a risk if an attacker gains control of an administrator account, as it could lead to further exploitation or unauthorized access to email server credentials.
Advice for Users:
Immediate Action: Users should update to the patched version 4.1.0 immediately to secure their websites and prevent potential exposure of sensitive information. Check for Signs of Vulnerability: Review your website’s admin access logs and check for any unauthorized access that might indicate a compromised administrator account. Alternate Plugins: While the vulnerability has been patched, users may consider exploring alternative plugins that offer similar functionality and robust security measures. Stay Updated: Regularly updating plugins to their latest versions is crucial to prevent vulnerabilities and ensure the security of your website.
Conclusion:
The prompt response from the WP Mail SMTP developers to patch this vulnerability underscores the importance of timely updates. Users are advised to ensure that they are running version 4.1.0 or later to secure their WordPress installations.