CVE-2025-24567

6.5 MEDIUM

📋 TL;DR

This vulnerability in WP Mailster WordPress plugin exposes sensitive embedded data in sent emails. Attackers can retrieve confidential information that was included in email content. All WordPress sites using WP Mailster versions up to 1.8.16.0 are affected.

💻 Affected Systems

Products:
  • WP Mailster WordPress Plugin
Versions: n/a through 1.8.16.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all sensitive data embedded in emails sent through the plugin, potentially including passwords, API keys, personal information, or internal communications.

🟠

Likely Case

Exposure of user data, configuration details, or other sensitive information that administrators or users included in email content.

🟢

If Mitigated

Limited exposure if no sensitive data was embedded in emails or if email content was properly sanitized before sending.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves retrieving data from sent emails, which typically requires access to email content or logs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.16.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-mailster/vulnerability/wordpress-wp-mailster-plugin-1-8-16-0-sensitive-data-exposure-vulnerability-2?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find WP Mailster
4. Click 'Update Now' if update is available
5. If no update appears, manually download version 1.8.16.1+ from WordPress.org
6. Deactivate old version, upload new version, activate

🔧 Temporary Workarounds

Disable WP Mailster Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wp-mailster

Restrict Email Access

all

Limit access to email logs and sent email storage

🧯 If You Can't Patch

  • Disable WP Mailster plugin immediately
  • Audit email logs for exposed sensitive data and rotate any compromised credentials

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Mailster version

Check Version:

wp plugin get wp-mailster --field=version

Verify Fix Applied:

Verify WP Mailster version is 1.8.16.1 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual email access patterns
  • Multiple requests to email-related endpoints
  • Access to email logs from unexpected IPs

Network Indicators:

  • Traffic to email storage locations
  • Requests for email content without proper authentication

SIEM Query:

source="wordpress" AND (plugin="wp-mailster" OR uri="/wp-content/plugins/wp-mailster/")

🔗 References

📤 Share & Export