All the vulnerabilites related to YayCommerce - YaySMTP
cve-2022-2369
Vulnerability from cvelistv5
Published
2022-08-01 12:52
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
YaySMTP < 2.2.1 - Subscriber+ Logs Disclosure
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | YaySMTP – Simple WP SMTP Mail |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "YaySMTP \u2013 Simple WP SMTP Mail", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.1", "status": "affected", "version": "2.2.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Rafshanzani Suhada" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-01T12:52:42", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d" } ], "source": { "discovery": "EXTERNAL" }, "title": "YaySMTP \u003c 2.2.1 - Subscriber+ Logs Disclosure", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2369", "STATE": "PUBLIC", "TITLE": "YaySMTP \u003c 2.2.1 - Subscriber+ Logs Disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "YaySMTP \u2013 Simple WP SMTP Mail", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.2.1", "version_value": "2.2.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Rafshanzani Suhada" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/9ec8d318-9d25-4868-94c6-7c16444c275d" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2369", "datePublished": "2022-08-01T12:52:42", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2371
Vulnerability from cvelistv5
Published
2022-08-08 13:47
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
YaySMTP < 2.2.1 - Subscriber+ Stored Cross-Site Scripting
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | YaySMTP – Simple WP SMTP Mail |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "YaySMTP \u2013 Simple WP SMTP Mail", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.1", "status": "affected", "version": "2.2.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Rafshanzani Suhada" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T13:47:39", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7" } ], "source": { "discovery": "EXTERNAL" }, "title": "YaySMTP \u003c 2.2.1 - Subscriber+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2371", "STATE": "PUBLIC", "TITLE": "YaySMTP \u003c 2.2.1 - Subscriber+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "YaySMTP \u2013 Simple WP SMTP Mail", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.2.1", "version_value": "2.2.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Rafshanzani Suhada" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2371", "datePublished": "2022-08-08T13:47:39", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2372
Vulnerability from cvelistv5
Published
2022-08-08 13:47
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
YaySMTP < 2.2.2 - Admin+ Stored Cross-Site Scripting
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Unknown | YaySMTP – Simple WP SMTP Mail |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "YaySMTP \u2013 Simple WP SMTP Mail", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "2.2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Rafshanzani Suhada" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T13:47:54", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45" } ], "source": { "discovery": "EXTERNAL" }, "title": "YaySMTP \u003c 2.2.2 - Admin+ Stored Cross-Site Scripting", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2372", "STATE": "PUBLIC", "TITLE": "YaySMTP \u003c 2.2.2 - Admin+ Stored Cross-Site Scripting" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "YaySMTP \u2013 Simple WP SMTP Mail", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.2.2", "version_value": "2.2.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Rafshanzani Suhada" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2372", "datePublished": "2022-08-08T13:47:54", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-0918
Vulnerability from cvelistv5
Published
2025-02-22 12:39
Modified
2025-02-24 12:51
Severity ?
EPSS score ?
Summary
SMTP for SendGrid – YaySMTP <= 1.3.1 - Unauthenticated Stored Cross-Site Scripting via Email Logs
References
Impacted products
▼ | Vendor | Product |
---|---|---|
yaycommerce | SMTP for SendGrid – YaySMTP |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0918", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T12:51:34.639779Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-24T12:51:45.764Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SMTP for SendGrid \u2013 YaySMTP", "vendor": "yaycommerce", "versions": [ { "lessThanOrEqual": "1.3.1", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Cristian Bejan" } ], "descriptions": [ { "lang": "en", "value": "The SMTP for SendGrid \u2013 YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-22T12:39:21.418Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php" }, { "url": "https://wordpress.org/plugins/smtp-sendgrid/#developers" }, { "url": "https://plugins.trac.wordpress.org/changeset/3056461/" }, { "url": "https://plugins.trac.wordpress.org/changeset/3234377/" } ], "timeline": [ { "lang": "en", "time": "2025-01-31T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2025-01-31T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-22T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "SMTP for SendGrid \u2013 YaySMTP \u003c= 1.3.1 - Unauthenticated Stored Cross-Site Scripting via Email Logs" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-0918", "datePublished": "2025-02-22T12:39:21.418Z", "dateReserved": "2025-01-31T00:06:27.898Z", "dateUpdated": "2025-02-24T12:51:45.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-0953
Vulnerability from cvelistv5
Published
2025-02-22 12:39
Modified
2025-02-24 12:50
Severity ?
EPSS score ?
Summary
SMTP for Sendinblue – YaySMTP <= 1.1.1 - Unauthenticated Stored Cross-Site Scripting via Email Logs
References
Impacted products
▼ | Vendor | Product |
---|---|---|
yaycommerce | SMTP for Sendinblue – YaySMTP |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0953", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-24T12:50:38.670042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-24T12:50:51.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SMTP for Sendinblue \u2013 YaySMTP", "vendor": "yaycommerce", "versions": [ { "lessThanOrEqual": "1.1.1", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Cristian Bejan" } ], "descriptions": [ { "lang": "en", "value": "The SMTP for Sendinblue \u2013 YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-22T12:39:21.934Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ba65ac-e568-4c13-961d-6453f281d9fc?source=cve" }, { "url": "https://wordpress.org/plugins/smtp-sendinblue/#developers" }, { "url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Helper/Utils.php" }, { "url": "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Functions.php" }, { "url": "https://plugins.trac.wordpress.org/changeset/3234379/" } ], "timeline": [ { "lang": "en", "time": "2025-01-31T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2025-01-31T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2025-02-22T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "SMTP for Sendinblue \u2013 YaySMTP \u003c= 1.1.1 - Unauthenticated Stored Cross-Site Scripting via Email Logs" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-0953", "datePublished": "2025-02-22T12:39:21.934Z", "dateReserved": "2025-01-31T19:56:58.737Z", "dateUpdated": "2025-02-24T12:50:51.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-53256
Vulnerability from cvelistv5
Published
2025-06-27 13:21
Modified
2025-06-27 14:45
Severity ?
EPSS score ?
Summary
WordPress YaySMTP plugin <= 6.8.1 - SQL Injection Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
YayCommerce | YaySMTP |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53256", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-27T14:36:26.223579Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-27T14:45:33.941Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "yaysmtp", "product": "YaySMTP", "vendor": "YayCommerce", "versions": [ { "lessThanOrEqual": "6.8.1", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Nguyen Kim Sang (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in YayCommerce YaySMTP allows SQL Injection.\u003c/p\u003e\u003cp\u003eThis issue affects YaySMTP: from n/a through 6.8.1.\u003c/p\u003e" } ], "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in YayCommerce YaySMTP allows SQL Injection. This issue affects YaySMTP: from n/a through 6.8.1." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-27T13:21:05.082Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/wordpress/plugin/yaysmtp/vulnerability/wordpress-yaysmtp-plugin-6-8-1-sql-injection-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress YaySMTP plugin \u003c= 6.8.1 - SQL Injection Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2025-53256", "datePublished": "2025-06-27T13:21:05.082Z", "dateReserved": "2025-06-27T11:58:24.740Z", "dateUpdated": "2025-06-27T14:45:33.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3093
Vulnerability from cvelistv5
Published
2023-07-12 04:38
Modified
2025-02-05 19:41
Severity ?
EPSS score ?
Summary
The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
yaycommerce | YaySMTP – Simple WP SMTP Mail |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:07.059Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2922163/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3093", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T18:38:26.529816Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T19:41:05.065Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "YaySMTP \u2013 Simple WP SMTP Mail", "vendor": "yaycommerce", "versions": [ { "status": "affected", "version": "2.4.5" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alex Thomas" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-12T04:38:45.199Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset/2922163/" } ], "timeline": [ { "lang": "en", "time": "2023-06-03T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2023-06-05T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2023-06-12T00:00:00.000+00:00", "value": "Disclosed" } ] } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2023-3093", "datePublished": "2023-07-12T04:38:45.199Z", "dateReserved": "2023-06-04T03:17:14.839Z", "dateUpdated": "2025-02-05T19:41:05.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-0916
Vulnerability from cvelistv5
Published
2025-02-19 11:10
Modified
2025-02-19 14:19
Severity ?
EPSS score ?
Summary
YaySMTP 2.4.9 - 2.6.2 - Unauthenticated Stored Cross-Site Scripting
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-0916", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T14:19:22.006052Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T14:19:33.083Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service", "vendor": "yaycommerce", "versions": [ { "lessThanOrEqual": "2.6.2", "status": "affected", "version": "2.4.9", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "D.Sim" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T11:10:38.414Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/209019bd-b214-4389-a972-42e38d501203?source=cve" }, { "url": "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Helper/Utils.php" }, { "url": "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Functions.php" }, { "url": "https://wordpress.org/plugins/yaysmtp/#developers" }, { "url": "https://plugins.trac.wordpress.org/changeset/3238172" } ], "timeline": [ { "lang": "en", "time": "2025-02-18T22:01:38.000+00:00", "value": "Disclosed" } ], "title": "YaySMTP 2.4.9 - 2.6.2 - Unauthenticated Stored Cross-Site Scripting" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-0916", "datePublished": "2025-02-19T11:10:38.414Z", "dateReserved": "2025-01-30T23:47:51.507Z", "dateUpdated": "2025-02-19T14:19:33.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-47587
Vulnerability from cvelistv5
Published
2025-05-07 14:20
Modified
2025-05-07 18:15
Severity ?
EPSS score ?
Summary
WordPress YaySMTP <= 2.6.4 - SQL Injection Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
YayCommerce | YaySMTP |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-47587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-07T17:20:08.273543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-07T18:15:28.579Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "yaysmtp", "product": "YaySMTP", "vendor": "YayCommerce", "versions": [ { "lessThanOrEqual": "2.6.4", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ChuongVN (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in YayCommerce YaySMTP allows Blind SQL Injection.\u003c/p\u003e\u003cp\u003eThis issue affects YaySMTP: from n/a through 2.6.4.\u003c/p\u003e" } ], "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in YayCommerce YaySMTP allows Blind SQL Injection. This issue affects YaySMTP: from n/a through 2.6.4." } ], "impacts": [ { "capecId": "CAPEC-7", "descriptions": [ { "lang": "en", "value": "CAPEC-7 Blind SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-07T14:20:21.213Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/wordpress/plugin/yaysmtp/vulnerability/wordpress-yaysmtp-2-6-4-sql-injection-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress YaySMTP \u003c= 2.6.4 - SQL Injection Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2025-47587", "datePublished": "2025-05-07T14:20:21.213Z", "dateReserved": "2025-05-07T10:44:15.221Z", "dateUpdated": "2025-05-07T18:15:28.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-2370
Vulnerability from cvelistv5
Published
2022-08-01 12:52
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
YaySMTP < 2.2.1 - Subscriber+ SMTP Credentials Leak
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334 | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:09.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "YaySMTP", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Rafshanzani Suhada" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The YaySMTP WordPress plugin before 2.2.1 does not have capability check before displaying the Mailer Credentials in JS code for the settings, allowing any authenticated users, such as subscriber to retrieve them" } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-04T08:50:23.489Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/bedda2a9-6c52-478e-b17a-7a4488419334" } ], "source": { "discovery": "EXTERNAL" }, "title": "YaySMTP \u003c 2.2.1 - Subscriber+ SMTP Credentials Leak", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2370", "datePublished": "2022-08-01T12:52:51", "dateReserved": "2022-07-11T00:00:00", "dateUpdated": "2024-08-03T00:32:09.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }