🔐 CVE Alert

CVE-2025-6993

HIGH 7.5

Ultimate WP Mail 1.0.17 - 1.3.6 - Missing Authorization to Authenticated (Contributor+) Privilege Escalation via get_email_log_details Function

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.

CWE CWE-862
Vendor rustaurius
Product ultimate wp mail
Published Jul 16, 2025
Last Updated Jul 16, 2025
Stay Ahead of the Next One

Get instant alerts for rustaurius ultimate wp mail

Be the first to know when new high vulnerabilities affecting rustaurius ultimate wp mail are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

rustaurius / Ultimate WP Mail
1.0.17 ≤ 1.3.6

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b19794de-b623-4017-bd91-73986383c58b?source=cve wordpress.org: https://wordpress.org/plugins/ultimate-wp-mail/#developers plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/ultimate-wp-mail/tags/1.3.6/includes/Ajax.class.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3328277

Credits

Kenneth Dunn