Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Post SMTP Plugin Hijacks Admins

November 5, 2025
Reading Time: 3 mins read
in Alerts
Microsoft Edge Adds Scareware Sensor

A recent security discovery involves a significant flaw in the Post SMTP plugin, a widely adopted email delivery solution for WordPress that offers extended features beyond the basic wp_mail() function. This vulnerability, which was reported on October 11 by researcher ‘netranger’ to the security firm Wordfence, concerns an email log disclosure that creates an opening for devastating account takeover attacks. Assigned the critical-severity score of 9.8 and tracked as CVE-2025-11833, this issue puts all versions of Post SMTP up to and including 3.6.0 at risk.

The core of the vulnerability lies in the fact that the plugin’s ‘PostmanEmailLogs’ flow contains a ‘$\_construct$’ function that lacks necessary authorization checks. Consequently, when a request is made for logged email content, the constructor directly renders it without performing capability checks. This failure allows any unauthenticated attacker to read arbitrary emails logged by the plugin. Crucially, these exposed emails can contain password reset messages, including the unique links that enable an attacker to change an administrator’s password without needing to be the legitimate account holder, resulting in a full site compromise.

Upon receiving the report, Wordfence validated the researcher’s exploit on October 15 and promptly disclosed the critical issue to the plugin’s vendor, Saad Iqbal. A patched version, Post SMTP 3.6.1, was made available on October 29. However, data from WordPress.org indicates that only about half of the plugin’s user base has applied this update, leaving an estimated 210,000 sites still exposed to potential administrator takeover attacks.

The threat escalated significantly on November 1, when hackers began actively exploiting CVE-2025-11833. Since the start of active exploitation, Wordfence has reported blocking over 4,500 exploit attempts targeting their customers. Given this immediate and severe risk, all website owners currently using the Post SMTP plugin are strongly urged to take decisive action: either update immediately to version 3.6.1 or completely disable the plugin until the patch can be safely applied.

This is not the first time the Post SMTP plugin has faced such a vulnerability; in July, another security firm, PatchStack, disclosed a similar flaw. That issue, tracked as CVE-2025-24000, also allowed hackers to access email logs containing full message content, even with low-level subscriber accounts. Just like the current crisis, that prior flaw presented the same severe risk, enabling unauthorized users to trigger password resets, intercept sensitive messages, and seize full control of administrator accounts.

Reference:

  • Smudged Serpent Hackers Target US Policy Experts Amid Rising Iran Israel Tensions
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

React Native CLI Flaw Exposed

November 5, 2025
Microsoft Edge Adds Scareware Sensor

Smudged Serpent Targets US Experts

November 5, 2025
China Linked Tick Exploits Lanscope

CISA Warns Linux Flaw Exploited

November 4, 2025
China Linked Tick Exploits Lanscope

China Linked Tick Exploits Lanscope

November 4, 2025
China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

November 4, 2025
HTTPTroy Backdoor Poses As VPN Invoice

HTTPTroy Backdoor Poses As VPN Invoice

November 3, 2025

Latest Alerts

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

CISA Warns Linux Flaw Exploited

China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

Subscribe to our newsletter

    Latest Incidents

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    Cybercriminals Exploit Remote Monitoring

    Malibu Boats Australia Hit By Ransomware

    Balancer Suffers 128 Million Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial