CVE-2025-0916

7.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to inject malicious scripts into WordPress pages using the YaySMTP plugin. When users visit compromised pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. WordPress sites running vulnerable plugin versions 2.4.9 to 2.6.2 are affected.

💻 Affected Systems

Products:
  • YaySMTP and Email Logs WordPress plugin
Versions: 2.4.9 to 2.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability was patched in version 2.4.8 but reintroduced in 2.4.9 when wp_kses_post() sanitization was removed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over the WordPress site, install backdoors, or redirect visitors to malicious sites, leading to complete site compromise and data theft.

🟠

Likely Case

Attackers inject malicious scripts to steal user session cookies, perform actions as logged-in users, or deface website content.

🟢

If Mitigated

With proper input validation and output escaping, script injection is prevented, limiting impact to minor data exposure if other vulnerabilities exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires finding vulnerable input fields and crafting XSS payloads, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.3 or later

Vendor Advisory: https://wordpress.org/plugins/yaysmtp/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find YaySMTP plugin. 4. Click 'Update Now' if available, or manually update to version 2.6.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

WordPress

Temporarily deactivate YaySMTP plugin until patched version is available.

wp plugin deactivate yaysmtp

Enable WordPress auto-updates

WordPress

Configure WordPress to automatically update plugins when security patches are released.

wp plugin auto-updates enable yaysmtp

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules to block malicious payloads.
  • Restrict plugin access to trusted IP addresses only using .htaccess or server configuration.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > YaySMTP > Version. If version is between 2.4.9 and 2.6.2 inclusive, the site is vulnerable.

Check Version:

wp plugin get yaysmtp --field=version

Verify Fix Applied:

After updating, confirm YaySMTP plugin version is 2.6.3 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to YaySMTP endpoints containing script tags or JavaScript code
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • Inbound requests with malicious payloads targeting /wp-content/plugins/yaysmtp/ paths

SIEM Query:

source="web_server" AND (uri_path="/wp-content/plugins/yaysmtp/" AND (body="<script>" OR body="javascript:"))

🔗 References

📤 Share & Export