• Resolved sara.mansouri

    (@saramansouri)


    Hello,

    We are using this plugin on a couple of our websites and hosting the website on WpEngine. We have received this email from WpEngine about this plugin vulnerability.:



    You are utilizing a vulnerable version of the POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin.

    At this time, we are not seeing that the plugin author has released an update or patch for this vulnerability.

    WP Engine summary of the vulnerability: Data from an attacker could be interpreted as code by site visitors’ web browsers. The ability to run code in another site visitors’ browser can be abused to steal information, or modify site configuration.

    Original 3rd-party’s report on the vulnerability: Please note that questions related to this article should be directed to the 3rd-party researcher and not WP Engine:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33999
    https://wpscan.com/vulnerability/58ab5352-d783-431a-b0a5-382381cc13fd

    We encourage you to assess the risk of continuing to use this plugin until a patch is released.

    Please make sure to run a backup of your database before making any changes. You can learn how to do this in this article: https://wpengine.com/support/restore/ .

    Would you like to avoid doing these updates manually in the future? Add the Smart Plugin Manager to your plan today!

    Finally, feel free to reach out to our Support team at any time if you have any questions!

    Thanks
    -WP Engine Security Team

Viewing 1 replies (of 1 total)
Viewing 1 replies (of 1 total)
  • The topic ‘plugin vulnerability’ is closed to new replies.