POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress


Software Type Plugin
Software Slug post-smtp (view on
Software Status Active
Software Author wpexpertsio
Software Website
Software Downloads 10,445,603
Software Active Installs 300,000
Software Record Last Updated December 4, 2023

9 Vulnerabilities

Title CVE ID CVSS Researchers Date
POST SMTP Mailer <= 2.7.0 - Unauthenticated Stored Cross-Site Scripting CVE-2023-5958 7.2 Marcin Węgłowski November 6, 2023
Post SMTP <= 2.6.0 - Authenticated (Administrator+) SQL Injection 7.2 October 3, 2023
Freemius SDK <= 2.5.9 - Reflected Cross-Site Scripting via fs_request_get CVE-2023-33999 6.1 Rafie Muhammad July 18, 2023
Post SMTP <= 2.5.7 - Unauthenticated Stored Cross-Site Scripting via Email CVE-2023-3082 7.2 Alex Thomas July 11, 2023
POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Account Compromise CVE-2023-3179 6.5 Erwan LR June 26, 2023
POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Arbitrary Log Deletion CVE-2023-3178 4.3 Erwan LR June 26, 2023
Post SMTP <= 2.1.6 - Authenticated (Administrator+) Blind Server-Side Request Forgery CVE-2022-2352 6.6 Raad Haddad September 5, 2022
Post SMTP Mailer/Email Log <= 2.1.3 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2022-2351 5.5 August 18, 2022
POST SMTP Mailer <= 2.0.20 - Cross-Site Request Forgery Bypass CVE-2021-4422 4.3 Jerome Bruandet March 1, 2021

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.