CVE-2025-0918
📋 TL;DR
The SMTP for SendGrid – YaySMTP WordPress plugin up to version 1.3.1 contains a stored cross-site scripting (XSS) vulnerability due to insufficient input sanitization. Unauthenticated attackers can inject malicious scripts that execute when users visit compromised pages. This affects all WordPress sites using vulnerable versions of this plugin.
💻 Affected Systems
- SMTP for SendGrid – YaySMTP WordPress plugin
📦 What is this software?
Yaysmtp by Yaycommerce
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, redirect users to malicious sites, deface websites, or perform actions on behalf of authenticated users.
Likely Case
Attackers inject malicious scripts to steal user session cookies or redirect users to phishing sites, potentially compromising user accounts.
If Mitigated
With proper input validation and output escaping, the vulnerability would be prevented, maintaining normal plugin functionality.
🎯 Exploit Status
Attackers can exploit this without authentication by injecting scripts through vulnerable input fields.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.2 or later
Vendor Advisory: https://wordpress.org/plugins/smtp-sendgrid/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'SMTP for SendGrid – YaySMTP'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.3.2+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable plugin
WordPressTemporarily disable the YaySMTP plugin until patched
wp plugin deactivate smtp-sendgrid
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads
- Restrict plugin access to trusted IP addresses only
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for YaySMTP version
Check Version:
wp plugin get smtp-sendgrid --field=version
Verify Fix Applied:
Verify plugin version is 1.3.2 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to plugin endpoints with script tags
- Multiple failed XSS attempts in web server logs
Network Indicators:
- HTTP requests containing script injection patterns to plugin-specific URLs
SIEM Query:
source="web_server" AND (uri_path="/wp-content/plugins/smtp-sendgrid/" OR uri_path LIKE "%/smtp-sendgrid/%") AND (http_method="POST" OR http_method="GET") AND (request_body LIKE "%<script>%" OR request_body LIKE "%javascript:%")
🔗 References
- https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php
- https://plugins.trac.wordpress.org/changeset/3056461/
- https://plugins.trac.wordpress.org/changeset/3234377/
- https://wordpress.org/plugins/smtp-sendgrid/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve