Critical WordPress Plugin Vulnerability Under Active Attack — Devs Must Act Now
🚨 Summary
A critical vulnerability in the popular Post SMTP WordPress plugin — installed on more than 400,000 sites worldwide — is currently being actively exploited in the wild, posing a severe risk to millions of users and developers. (SecurityWeek)
Security researchers have observed active exploitation attempts targeting the flaw, which allows threat actors to access email logs (including password resets) and hijack administrative accounts — essentially taking over affected WordPress sites if left unpatched. (Reddit)
📌 What Happened?
- A critical security vulnerability, tracked as CVE-2025-24000, was discovered in the Post SMTP Mailer/Email Log plugin used by hundreds of thousands of WordPress websites. (SecurityWeek)
- This flaw stems from broken access control in the plugin’s REST API, allowing attackers to view sensitive email logs that include password reset links. (SecurityWeek)
- Exploitation enables unauthorized users to reset admin passwords and take full control of a site. (SecurityWeek)
🔥 Active Exploitation: Why This Matters
According to recent security reports, attackers began exploiting this vulnerability immediately after public disclosure, and automated exploit attempts are being seen at scale: (Reddit)
- Exploit attempts began shortly after vulnerability disclosure in late October 2025. (Reddit)
- Thousands of malicious requests have been blocked by security tools such as Wordfence. (Reddit)
- Unpatched sites remain at risk of full compromise, including data theft, malware deployment, and persistent backdoor installation. (Reddit)
🛡️ What Developers Must Do
If your WordPress project uses Post SMTP:
- Update Immediately: Ensure your plugin is updated to the latest security-patched version (3.6.1 or above). (Reddit)
- Review Logs & Accounts: Check server and login activity logs for unusual account resets or unknown admin users.
- Revoke Compromised Tokens: Reset keys and passwords for admin users if suspicious activity is detected.
- Implement WAF Rules: Use a Web Application Firewall (WAF) to block known exploit patterns.
- Perform Security Scans: Scan with tools like WPScan or Wordfence to uncover any backdoors or malicious payloads.
📌 Key Takeaways for Devs
- Vulnerabilities in plugins remain one of the biggest attack surfaces for WordPress — even for high-install, well-maintained plugins.
- Timely patching and responsible vulnerability disclosure are critical; however, many sites still run outdated or unpatched software.
- Developers must adopt a proactive update and monitoring strategy to protect both staging and production environments.
📎 Related Security Alerts & Context
Several other WordPress plugins and components have seen severe vulnerabilities in 2025, including:
- Critical XSS vulnerability in LiteSpeed Cache, affecting millions of installs. (Cyber Security News)
- SQL injection flaws and privilege escalation in membership and automation plugins. (The Hack Academy)
- High-severity vulnerabilities in security and cache plugins requiring immediate updates. (ThaiCERT)