We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6694

WP Mail SMTP <= 4.0.1 - Authenticated (Admin+) SMTP Password Exposure



AssignerWordfence
Reserved2024-07-11
Published2024-07-20
Updated2024-08-01

Description

The WP Mail SMTP plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 4.0.1. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment.



LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-257 Storing Passwords in a Recoverable Format

Product status

Default status
unaffected

*
affected

Timeline

2024-07-19:Disclosed

Credits

Guus Verbeek 0x400b9d3ec0

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/2d4e9daf-d414-4ace-9efd-4c3e16deeb8f?source=cve

https://plugins.trac.wordpress.org/changeset/3120454/wp-mail-smtp/trunk/src/Providers/OptionsAbstract.php

cve.org CVE-2024-6694

nvd.nist.gov CVE-2024-6694

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.