|POST SMTP Mailer <= 2.7.0 - Unauthenticated Stored Cross-Site Scripting||CVE-2023-5958||Marcin Węgłowski||November 6, 2023|
|Post SMTP <= 2.6.0 - Authenticated (Administrator+) SQL Injection||October 3, 2023|
|Freemius SDK <= 2.5.9 - Reflected Cross-Site Scripting via fs_request_get||CVE-2023-33999||Rafie Muhammad||July 18, 2023|
|Post SMTP <= 2.5.7 - Unauthenticated Stored Cross-Site Scripting via Email||CVE-2023-3082||Alex Thomas||July 11, 2023|
|POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Account Compromise||CVE-2023-3179||Erwan LR||June 26, 2023|
|POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Arbitrary Log Deletion||CVE-2023-3178||Erwan LR||June 26, 2023|
|Post SMTP <= 2.1.6 - Authenticated (Administrator+) Blind Server-Side Request Forgery||CVE-2022-2352||Raad Haddad||September 5, 2022|
|Post SMTP Mailer/Email Log <= 2.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting||CVE-2022-2351||August 18, 2022|
|POST SMTP Mailer <= 2.0.20 - Cross-Site Request Forgery Bypass||CVE-2021-4422||Jerome Bruandet||March 1, 2021|
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!Learn more
Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.Documentation