CVE-2025-22800
Published: 13 January 2025
Summary
CVE-2025-22800 is a medium-severity Missing Authorization (CWE-862) vulnerability in Wpexperts Post Smtp. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces approved authorizations for logical access to system resources, mitigating the missing authorization flaw that allows low-privileged users to exploit the Post SMTP plugin.
Restricts privileges to the minimum necessary for users and processes, limiting the potential impact of low-privileged exploitation in the plugin's broken access control.
Establishes and enforces secure configuration settings for software like the Post SMTP plugin, preventing exploitation of incorrectly configured access control security levels.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization in public-facing WordPress plugin enables remote exploitation for low-impact DoS by low-privileged users.
NVD Description
Missing Authorization vulnerability in Saad Iqbal Post SMTP post-smtp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through <= 2.9.11.
Deeper analysisAI
CVE-2025-22800 is a missing authorization vulnerability (CWE-862) in the Post SMTP WordPress plugin developed by Saad Iqbal. The flaw, which allows exploiting incorrectly configured access control security levels, affects all versions of the post-smtp plugin up to and including 2.9.11. Published on 2025-01-13, it carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
A low-privileged user (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation results in low-impact denial of service (A:L), with no effects on confidentiality or integrity and no change in scope (S:U).
The Patchstack advisory provides details on this broken access control issue in Post SMTP version 2.9.11 and related mitigation guidance, accessible at https://patchstack.com/database/Wordpress/Plugin/post-smtp/vulnerability/wordpress-post-smtp-plugin-2-9-11-broken-access-control-vulnerability?_s_id=cve.
Details
- CWE(s)