CVE-2021-4422

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-4422
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-4422.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-4422
Published
2023-07-12T07:15:09Z
Modified
2025-06-06T03:49:54.600505Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

References

Affected packages

Git / github.com/wpexpertsio/post-smtp

Affected ranges

Type
GIT
Repo
https://github.com/wpexpertsio/post-smtp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*

2.0.1
2.0.10
2.0.11
2.0.12
2.0.13
2.0.14
2.0.15
2.0.16
2.0.17
2.0.18
2.0.19
2.0.2
2.0.20
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.0.9

v.*

v.1.9.0
v.1.9.1
v.1.9.2

v1.*

v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7
v1.9.8