CVE-2025-6993

7.5 HIGH

📋 TL;DR

The Ultimate WP Mail WordPress plugin versions 1.0.17 to 1.3.6 contain a privilege escalation vulnerability where authenticated users with Contributor-level access or higher can access password reset links intended for administrators. This allows attackers to elevate their privileges to administrator level. WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Ultimate WP Mail WordPress Plugin
Versions: 1.0.17 to 1.3.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where an attacker gains administrator access, installs backdoors, steals sensitive data, defaces the site, or uses it for further attacks.

🟠

Likely Case

Attacker gains administrator privileges, modifies site content, installs malicious plugins/themes, or accesses sensitive user data.

🟢

If Mitigated

Limited impact if proper access controls, monitoring, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7

Vendor Advisory: https://wordpress.org/plugins/ultimate-wp-mail/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ultimate WP Mail plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.3.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Ultimate WP Mail plugin until patched.

wp plugin deactivate ultimate-wp-mail

Restrict user roles

all

Limit users with Contributor role or higher to trusted individuals only.

🧯 If You Can't Patch

  • Remove Contributor and higher roles from untrusted users
  • Implement web application firewall rules to block suspicious AJAX requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Ultimate WP Mail → Version. If between 1.0.17 and 1.3.6 inclusive, vulnerable.

Check Version:

wp plugin get ultimate-wp-mail --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to admin-ajax.php with action=get_email_log_details from non-admin users
  • Multiple failed login attempts followed by successful Contributor/Author login

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=get_email_log_details parameter

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "get_email_log_details" AND NOT user_role="administrator"

🔗 References

📤 Share & Export