Advisory

Account takeover flaw reported in widely used Post SMTP Plugin

Take action: If you use the Post SMTP WordPress plugin, immediately update to version 3.3.0 or newer. Any logged-in user can hijack admin accounts. There is no workaround to this and updating the plugin is easy, so don't delay.


Learn More

A security vulnerability has been discovered in the widely-used Post SMTP WordPress plugin, potentially exposing over 400,000 websites to account takeover attacks. 

The vulnerability is tracked as CVE-2025-24000 (CVSS score 8.8) and is caused by broken access control in the plugin's REST API endpoints. These endpoints only validated whether a user was logged into the system, without verifying their actual privileges or permissions level. This flaw allows any registered user, including those with basic Subscriber-level accounts to view email count statistics, resend emails, and access detailed email logs containing complete email bodies which may contain password reset links.

By viewing a password reset emails, a Subscriber-level user could reset the password of an Administrator account and gain complete control over the website.

The vulnerability has been patched in Post SMTP version 3.3.0, which was released on June 11, 2025.

Download statistics on WordPress.org show that less than half of the plugin's user base (48.5%) has updated to version 3.3.0, meaning that more than 200,000 websites remain vulnerable to CVE-2025-24000. About 24.2%, corresponding to 96,800 sites, still run Post SMTP versions from the 2.x branch, which is vulnerable to additional security flaws 

Website administrators should update to version 3.3.0 immediately.

Account takeover flaw reported in widely used Post SMTP Plugin