Cyber Posture

CVE-2025-22800

Medium

Published: 13 January 2025

Published
13 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS Score 0.0007 20.4th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22800 is a medium-severity Missing Authorization (CWE-862) vulnerability in Wpexperts Post Smtp. Its CVSS base score is 4.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations for logical access to system resources, mitigating the missing authorization flaw that allows low-privileged users to exploit the Post SMTP plugin.

prevent

Restricts privileges to the minimum necessary for users and processes, limiting the potential impact of low-privileged exploitation in the plugin's broken access control.

prevent

Establishes and enforces secure configuration settings for software like the Post SMTP plugin, preventing exploitation of incorrectly configured access control security levels.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499 Endpoint Denial of Service Impact
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users.
Why these techniques?

Missing authorization in public-facing WordPress plugin enables remote exploitation for low-impact DoS by low-privileged users.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Missing Authorization vulnerability in Saad Iqbal Post SMTP post-smtp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through <= 2.9.11.

Deeper analysisAI

CVE-2025-22800 is a missing authorization vulnerability (CWE-862) in the Post SMTP WordPress plugin developed by Saad Iqbal. The flaw, which allows exploiting incorrectly configured access control security levels, affects all versions of the post-smtp plugin up to and including 2.9.11. Published on 2025-01-13, it carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).

A low-privileged user (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation results in low-impact denial of service (A:L), with no effects on confidentiality or integrity and no change in scope (S:U).

The Patchstack advisory provides details on this broken access control issue in Post SMTP version 2.9.11 and related mitigation guidance, accessible at https://patchstack.com/database/Wordpress/Plugin/post-smtp/vulnerability/wordpress-post-smtp-plugin-2-9-11-broken-access-control-vulnerability?_s_id=cve.

Details

CWE(s)

Affected Products

wpexperts
post smtp
≤ 2.9.12

CVEs Like This One

CVE-2025-0521Same product: Wpexperts Post Smtp
CVE-2025-28872Shared CWE-862
CVE-2025-7040Shared CWE-862
CVE-2025-67974Shared CWE-862
CVE-2026-28254Shared CWE-862
CVE-2026-3266Shared CWE-862
CVE-2025-69297Shared CWE-862
CVE-2025-69186Shared CWE-862
CVE-2026-25456Shared CWE-862
CVE-2025-13493Shared CWE-862

References