Vulnerability Details CVE-2023-3213
The WP Mail SMTP Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the is_print_page function in versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to disclose potentially sensitive email information.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 52.2%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2023-3213
-
cpe:2.3:a:wpforms:wp_mail_smtp:0.11
-
cpe:2.3:a:wpforms:wp_mail_smtp:0.11.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:0.11.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.0.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.0.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.0.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.1.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.3
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.4
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.2.5
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.3.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.3.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.3.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.3.3
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.4.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.4.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.5.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.5.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.5.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.5.3
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.6.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.6.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.6.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.7.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.7.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.8.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.8.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:1.9.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.0.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.0.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.1.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.1.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.1.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.2.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.2.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.3.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.3.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.4.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.5.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.5.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.5.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.5.3
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.6.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.7.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.8.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.9.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:2.9.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.0.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.0.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.0.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.1.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.2.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.2.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.3.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.4.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.5.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.5.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.5.2
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.6.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.6.1
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.7.0
-
cpe:2.3:a:wpforms:wp_mail_smtp:3.8.0