Vulnerability Details CVE-2022-2352
The Post SMTP Mailer/Email Log WordPress plugin before 2.1.7 does not have proper authorisation in some AJAX actions, which could allow high privilege users such as admin to perform blind SSRF on multisite installations for example.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 56.4%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2022-2352
-
cpe:2.3:a:wpexperts:post_smtp:-
-
cpe:2.3:a:wpexperts:post_smtp:1.6.23
-
cpe:2.3:a:wpexperts:post_smtp:1.6.24
-
cpe:2.3:a:wpexperts:post_smtp:1.7.0
-
cpe:2.3:a:wpexperts:post_smtp:1.7.1
-
cpe:2.3:a:wpexperts:post_smtp:1.7.10
-
cpe:2.3:a:wpexperts:post_smtp:1.7.2
-
cpe:2.3:a:wpexperts:post_smtp:1.7.5
-
cpe:2.3:a:wpexperts:post_smtp:1.7.6
-
cpe:2.3:a:wpexperts:post_smtp:1.7.7
-
cpe:2.3:a:wpexperts:post_smtp:1.7.8
-
cpe:2.3:a:wpexperts:post_smtp:1.7.9
-
cpe:2.3:a:wpexperts:post_smtp:1.8
-
cpe:2.3:a:wpexperts:post_smtp:1.8.1
-
cpe:2.3:a:wpexperts:post_smtp:1.8.2
-
cpe:2.3:a:wpexperts:post_smtp:1.8.3
-
cpe:2.3:a:wpexperts:post_smtp:1.8.4
-
cpe:2.3:a:wpexperts:post_smtp:1.8.5
-
cpe:2.3:a:wpexperts:post_smtp:1.8.6
-
cpe:2.3:a:wpexperts:post_smtp:1.8.7
-
cpe:2.3:a:wpexperts:post_smtp:1.8.8
-
cpe:2.3:a:wpexperts:post_smtp:1.8.9
-
cpe:2.3:a:wpexperts:post_smtp:1.9.0
-
cpe:2.3:a:wpexperts:post_smtp:1.9.1
-
cpe:2.3:a:wpexperts:post_smtp:1.9.2
-
cpe:2.3:a:wpexperts:post_smtp:1.9.3
-
cpe:2.3:a:wpexperts:post_smtp:1.9.4
-
cpe:2.3:a:wpexperts:post_smtp:1.9.5
-
cpe:2.3:a:wpexperts:post_smtp:1.9.6
-
cpe:2.3:a:wpexperts:post_smtp:1.9.7
-
cpe:2.3:a:wpexperts:post_smtp:1.9.8
-
cpe:2.3:a:wpexperts:post_smtp:2.0
-
cpe:2.3:a:wpexperts:post_smtp:2.0.1
-
cpe:2.3:a:wpexperts:post_smtp:2.0.10
-
cpe:2.3:a:wpexperts:post_smtp:2.0.11
-
cpe:2.3:a:wpexperts:post_smtp:2.0.12
-
cpe:2.3:a:wpexperts:post_smtp:2.0.13
-
cpe:2.3:a:wpexperts:post_smtp:2.0.14
-
cpe:2.3:a:wpexperts:post_smtp:2.0.15
-
cpe:2.3:a:wpexperts:post_smtp:2.0.16
-
cpe:2.3:a:wpexperts:post_smtp:2.0.17
-
cpe:2.3:a:wpexperts:post_smtp:2.0.18
-
cpe:2.3:a:wpexperts:post_smtp:2.0.19
-
cpe:2.3:a:wpexperts:post_smtp:2.0.2
-
cpe:2.3:a:wpexperts:post_smtp:2.0.20
-
cpe:2.3:a:wpexperts:post_smtp:2.0.21
-
cpe:2.3:a:wpexperts:post_smtp:2.0.22
-
cpe:2.3:a:wpexperts:post_smtp:2.0.23
-
cpe:2.3:a:wpexperts:post_smtp:2.0.24
-
cpe:2.3:a:wpexperts:post_smtp:2.0.25
-
cpe:2.3:a:wpexperts:post_smtp:2.0.26
-
cpe:2.3:a:wpexperts:post_smtp:2.0.27
-
cpe:2.3:a:wpexperts:post_smtp:2.0.3
-
cpe:2.3:a:wpexperts:post_smtp:2.0.4
-
cpe:2.3:a:wpexperts:post_smtp:2.0.5
-
cpe:2.3:a:wpexperts:post_smtp:2.0.6
-
cpe:2.3:a:wpexperts:post_smtp:2.0.7
-
cpe:2.3:a:wpexperts:post_smtp:2.0.8
-
cpe:2.3:a:wpexperts:post_smtp:2.0.9
-
cpe:2.3:a:wpexperts:post_smtp:2.1
-
cpe:2.3:a:wpexperts:post_smtp:2.1.1
-
cpe:2.3:a:wpexperts:post_smtp:2.1.1.1
-
cpe:2.3:a:wpexperts:post_smtp:2.1.2
-
cpe:2.3:a:wpexperts:post_smtp:2.1.3
-
cpe:2.3:a:wpexperts:post_smtp:2.1.4
-
cpe:2.3:a:wpexperts:post_smtp:2.1.5
-
cpe:2.3:a:wpexperts:post_smtp:2.1.6