Post SMTP Plugin Vulnerability Exploited to Hijack WordPress Admin Accounts
Summary
Hide ▲
Show ▼
A critical vulnerability in the Post SMTP WordPress plugin, tracked as CVE-2025-11833, is being actively exploited to hijack administrator accounts. The flaw allows unauthenticated attackers to read logged emails, including password reset messages, leading to account takeover and full site compromise. The vulnerability affects all versions of Post SMTP from 3.6.0 and older, with over 400,000 downloads. The issue was reported on October 11 and patched on October 29. However, as of November 4, at least 210,000 sites remain vulnerable. Exploitation attempts began on November 1, with over 4,500 blocked attempts since then. The Post SMTP plugin is a popular email delivery solution for WordPress. The flaw allows unauthenticated attackers to read arbitrary logged emails, including password reset messages. The vulnerability was reported on October 11 and patched on October 29. However, as of November 4, at least 210,000 sites remain vulnerable. Exploitation attempts began on November 1, with over 4,500 blocked attempts since then.
Timeline
-
04.11.2025 23:46 2 articles · 6d ago
Active Exploitation of Post SMTP Plugin Vulnerability
The Post SMTP plugin has over 400,000 downloads, indicating widespread use. The vulnerability was discovered by a user named "netranger" through Wordfence's bug bounty program, earning a $7,800 bounty. Wordfence has issued a firewall rule to protect against the vulnerability for Premium, Care, and Response users, with free users receiving protection on November 14. The flaw is due to a missing capability check in the __construct function of the PostmanEmailLogs class.
Show sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
Information Snippets
-
The Post SMTP plugin is a popular email delivery solution for WordPress.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The vulnerability, CVE-2025-11833, affects all versions of Post SMTP from 3.6.0 and older.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The flaw allows unauthenticated attackers to read arbitrary logged emails, including password reset messages.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The vulnerability was reported on October 11 and patched on October 29.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
As of November 4, at least 210,000 sites remain vulnerable to admin takeover attacks.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
Exploitation attempts began on November 1, with over 4,500 blocked attempts since then.
First reported: 04.11.2025 23:462 sources, 2 articlesShow sources
- Hackers exploit WordPress plugin Post SMTP to hijack admin accounts — www.bleepingcomputer.com — 04.11.2025 23:46
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The Post SMTP plugin has over 400,000 downloads, indicating widespread use.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
Wordfence received the vulnerability report through its bug bounty program.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The vulnerability was discovered by a user named "netranger" and earned a $7,800 bounty.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
Wordfence issued a firewall rule to protect against CVE-2025-11833 for Premium, Care, and Response users.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
Free Wordfence users will receive the same protection on November 14.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
-
The flaw is due to a missing capability check in the __construct function of the PostmanEmailLogs class.
First reported: 05.11.2025 16:351 source, 1 articleShow sources
- Critical Site Takeover Flaw Affects 400K WordPress Sites — www.darkreading.com — 05.11.2025 16:35
Similar Happenings
Critical vulnerabilities in Elementor King Addons plugin affect 10,000 WordPress sites
The Elementor King Addons plugin, used by over 10,000 WordPress sites, has two unauthenticated critical vulnerabilities. These flaws can lead to full site takeovers. The vulnerabilities include an arbitrary file upload flaw (CVE-2025-6327) and a privilege escalation issue (CVE-2025-6325). The plugin's vendor has released version 51.1.37 to address these issues. The arbitrary file upload vulnerability allows attackers to place files in web-accessible directories due to improper nonce handling and file validation. The privilege escalation flaw permits attackers to create administrator accounts by exploiting the registration endpoint. Site administrators should update the plugin immediately to mitigate the risk of full site compromise.
Anti-Malware Security and Brute-Force Firewall plugin vulnerability exposes private data
The Anti-Malware Security and Brute-Force Firewall plugin for WordPress, installed on over 100,000 sites, has a vulnerability that allows authenticated subscribers to read arbitrary files on the server, potentially exposing private information. The flaw, tracked as CVE-2025-11705, affects versions 4.23.81 and earlier. The vulnerability stems from missing capability checks in the GOTMLS_ajax_scan() function, which processes AJAX requests using a nonce that attackers can obtain. This oversight allows low-privileged users to read sensitive data, including the wp-config.php configuration file, which stores database credentials. With access to the database, an attacker can extract password hashes, users’ emails, posts, and other private data. The vulnerability was reported to Wordfence by researcher Dmitrii Ignatyev and was patched by the vendor in version 4.23.83, released on October 15, 2025. Wordfence recommends applying the patch to mitigate the risk of exploitation.
Mass Exploitation Campaign Targets Outdated WordPress Plugins
A widespread campaign is exploiting outdated WordPress plugins GutenKit and Hunk Companion, targeting critical vulnerabilities to achieve remote code execution (RCE). The campaign, which began on October 8, 2025, exploited three critical-severity flaws in the plugins, affecting over 48,000 installs. Attackers use malicious plugins hosted on GitHub to maintain persistence, steal data, and execute commands on compromised sites. Wordfence has blocked nearly 8.8 million exploitation attempts. The vulnerabilities were patched in October and December 2024, but many sites remain unpatched.