Post SMTP CVE-2025-11833: Brief Summary of Critical Unauthorized Email Log Access in WordPress

Brief summary of CVE-2025-11833 affecting Post SMTP WordPress plugin up to 3.6.0. This vulnerability allows unauthenticated attackers to access logged emails, including password reset links, leading to potential account takeover. Includes technical details, affected versions, and vendor security history.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-10-31

Post SMTP CVE-2025-11833: Brief Summary of Critical Unauthorized Email Log Access in WordPress
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers can retrieve password reset emails and take over administrator accounts on any WordPress site running vulnerable versions of the Post SMTP plugin. With over 400,000 active installations, this flaw exposes a huge segment of the WordPress ecosystem to unauthorized access and account compromise.

Post SMTP is a widely used WordPress plugin for handling SMTP email delivery, including logging, alerts, and backup SMTP. Its popularity makes vulnerabilities in this plugin highly impactful across a broad range of websites, from small blogs to enterprise deployments.

Technical Information

CVE-2025-11833 is caused by a missing capability check in the __construct function of the Post SMTP plugin's email log handler. In all versions up to and including 3.6.0, the plugin does not verify user permissions before initializing access to email log endpoints. This omission allows unauthenticated users to directly access REST API endpoints that expose the contents of logged emails.

The vulnerable code path is referenced in the plugin's codebase:

Because the permission check is absent, attackers can send direct HTTP requests to the relevant REST API endpoints and retrieve any email logged by the plugin. This includes password reset emails, which contain reset links. By intercepting these emails, an attacker can reset the password for any user, including administrators, and gain full control of the WordPress site.

The vulnerability is classified as CWE-862 (Missing Authorization). The attack requires only network access to the affected WordPress instance and does not require authentication or any prior knowledge of the system.

Affected Systems and Versions

  • Product: Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App (WordPress plugin)
  • Affected versions: All versions up to and including 3.6.0
  • Vulnerable configuration: Any WordPress installation with the affected plugin version active

Vendor Security History

  • The Post SMTP plugin has a history of critical authorization and REST API exposure vulnerabilities:
    • CVE-2025-24000: Missing authorization allowed authenticated users to access email logs
    • CVE-2023-6875: Type juggling in REST endpoint allowed unauthenticated API key reset and log access
  • The vendor has issued patches in response to disclosures but similar issues have recurred, indicating a need for improved security review and development practices.

References

Detect & fix
what others miss