Cyber Posture

CVE-2025-0916

High

Published: 19 February 2025

Published
19 February 2025
Modified
25 February 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0054 67.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function.

Security Summary

CVE-2025-0916 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting the YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress in versions 2.4.9 through 2.6.2. The flaw stems from insufficient input sanitization and output escaping, enabling the injection of arbitrary web scripts into pages. It carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N). Notably, the issue was initially addressed in version 2.4.8 but reintroduced in 2.4.9 due to the removal of WordPress's built-in wp_kses_post() sanitization function.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By injecting malicious scripts into plugin-managed pages, attackers achieve code execution in the context of any user who subsequently accesses those pages, potentially leading to low-level impacts on confidentiality and integrity, such as session hijacking or data theft, with the vulnerability's scope-changing nature amplifying risks across affected sites.

Advisories, including those from Wordfence, recommend updating to a patched version of the plugin beyond the vulnerable range, as evidenced by source code changesets in the WordPress plugin trac (e.g., changeset 3238172) and related functions in Functions.php and Utils.php. The plugin's developer page on WordPress.org provides further details on updates and remediation.

Details

CWE(s)
CWE-79

Affected Products

yaycommerce
yaysmtp
2.4.9 — 2.6.3

References