CVE-2026-6235

Sendmachine · Sendmachine for WordPress

The Sendmachine for WordPress plugin is vulnerable to an authorization bypass, allowing unauthenticated attackers to modify SMTP configurations.

Executive summary

An unauthenticated attacker can intercept site emails by exploiting an authorization bypass in the Sendmachine for WordPress plugin.

Vulnerability

The manage_admin_requests function lacks proper capability checks, enabling unauthenticated attackers to alter the plugin's SMTP settings.

Business impact

By hijacking the SMTP configuration, attackers can intercept sensitive communications, including password reset emails and authentication tokens, leading to potential account takeovers. With a CVSS score of 9.8, this vulnerability poses a severe threat to site security and user privacy.

Remediation

Immediate Action: Update to the latest version of the Sendmachine for WordPress plugin.

Proactive Monitoring: Monitor SMTP configuration settings and email logs for any unauthorized changes or unexpected email routing behavior.

Compensating Controls: Use a Web Application Firewall (WAF) to block unauthorized requests to administrative plugin endpoints until a patch is applied.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Site administrators should update the plugin immediately. Additionally, verify that current SMTP settings have not been tampered with and consider rotating credentials for any mail accounts previously configured in the plugin.