CVE-2025-0916: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yaycommerce YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service
The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function.
AI Analysis
Technical Summary
CVE-2025-0916 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the YaySMTP and Email Logs WordPress plugin versions 2.4.9 through 2.6.2. The vulnerability stems from improper neutralization of input during web page generation, specifically due to the removal of the wp_kses_post() sanitization function in version 2.4.9, which had previously mitigated this issue in version 2.4.8. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim’s privileges. The plugin integrates with multiple SMTP services including Amazon SES, SendGrid, Outlook, Mailgun, Brevo, and Google, making it widely used in WordPress environments that handle email delivery and logging. The vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 7.2 reflects a high-severity rating due to the ease of exploitation and the potential impact on confidentiality and integrity, although availability is not affected. No public exploit code or active exploitation has been reported yet, but the reintroduction of the vulnerability after a prior fix suggests potential oversight in secure coding practices. Organizations using affected plugin versions should urgently review and update to patched versions once available or apply alternative mitigations to prevent script injection.
Potential Impact
The impact of CVE-2025-0916 is significant for organizations using the affected YaySMTP and Email Logs plugin versions. Successful exploitation can lead to stored XSS attacks, allowing attackers to execute arbitrary scripts in the context of authenticated users’ browsers. This can result in theft of sensitive information such as session cookies, credentials, or personally identifiable information, leading to account compromise and unauthorized access. Attackers may also perform actions on behalf of users, potentially modifying email logs or configurations, which could disrupt email delivery or facilitate further attacks such as phishing. The vulnerability affects confidentiality and integrity but does not impact availability directly. Given the plugin’s integration with major SMTP services, organizations relying on these email infrastructures for critical communications, including e-commerce, customer notifications, and internal alerts, face increased risk of data breaches and operational disruption. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat surface. Although no known exploits are currently active in the wild, the vulnerability’s presence in widely deployed WordPress plugins means a large number of websites could be targeted, especially those with high traffic or valuable user data.
Mitigation Recommendations
To mitigate CVE-2025-0916, organizations should immediately verify the version of the YaySMTP and Email Logs plugin in use and upgrade to a version where the vulnerability is fully patched once released. Until an official patch is available, consider the following specific actions: 1) Re-enable or implement robust input sanitization and output escaping functions such as wp_kses_post() to neutralize potentially malicious input; 2) Restrict access to plugin pages that render user-generated content by applying strict user role permissions or IP-based access controls; 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the plugin’s endpoints; 4) Conduct thorough code reviews and security testing on customizations or integrations involving the plugin to identify injection points; 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts; 6) Educate site administrators about the risks of installing unverified plugin versions and the importance of timely updates. Additionally, consider isolating critical email infrastructure components and enforcing Content Security Policy (CSP) headers to limit script execution scope. These targeted mitigations go beyond generic advice by focusing on the plugin’s specific weaknesses and operational context.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, South Korea
CVE-2025-0916: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yaycommerce YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service
Description
The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-0916 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the YaySMTP and Email Logs WordPress plugin versions 2.4.9 through 2.6.2. The vulnerability stems from improper neutralization of input during web page generation, specifically due to the removal of the wp_kses_post() sanitization function in version 2.4.9, which had previously mitigated this issue in version 2.4.8. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into pages generated by the plugin. When other users access these pages, the malicious scripts execute in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim’s privileges. The plugin integrates with multiple SMTP services including Amazon SES, SendGrid, Outlook, Mailgun, Brevo, and Google, making it widely used in WordPress environments that handle email delivery and logging. The vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 7.2 reflects a high-severity rating due to the ease of exploitation and the potential impact on confidentiality and integrity, although availability is not affected. No public exploit code or active exploitation has been reported yet, but the reintroduction of the vulnerability after a prior fix suggests potential oversight in secure coding practices. Organizations using affected plugin versions should urgently review and update to patched versions once available or apply alternative mitigations to prevent script injection.
Potential Impact
The impact of CVE-2025-0916 is significant for organizations using the affected YaySMTP and Email Logs plugin versions. Successful exploitation can lead to stored XSS attacks, allowing attackers to execute arbitrary scripts in the context of authenticated users’ browsers. This can result in theft of sensitive information such as session cookies, credentials, or personally identifiable information, leading to account compromise and unauthorized access. Attackers may also perform actions on behalf of users, potentially modifying email logs or configurations, which could disrupt email delivery or facilitate further attacks such as phishing. The vulnerability affects confidentiality and integrity but does not impact availability directly. Given the plugin’s integration with major SMTP services, organizations relying on these email infrastructures for critical communications, including e-commerce, customer notifications, and internal alerts, face increased risk of data breaches and operational disruption. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the threat surface. Although no known exploits are currently active in the wild, the vulnerability’s presence in widely deployed WordPress plugins means a large number of websites could be targeted, especially those with high traffic or valuable user data.
Mitigation Recommendations
To mitigate CVE-2025-0916, organizations should immediately verify the version of the YaySMTP and Email Logs plugin in use and upgrade to a version where the vulnerability is fully patched once released. Until an official patch is available, consider the following specific actions: 1) Re-enable or implement robust input sanitization and output escaping functions such as wp_kses_post() to neutralize potentially malicious input; 2) Restrict access to plugin pages that render user-generated content by applying strict user role permissions or IP-based access controls; 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting the plugin’s endpoints; 4) Conduct thorough code reviews and security testing on customizations or integrations involving the plugin to identify injection points; 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts; 6) Educate site administrators about the risks of installing unverified plugin versions and the importance of timely updates. Additionally, consider isolating critical email infrastructure components and enforcing Content Security Policy (CSP) headers to limit script execution scope. These targeted mitigations go beyond generic advice by focusing on the plugin’s specific weaknesses and operational context.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-30T23:47:51.507Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b6db7ef31ef0b55555e
Added to database: 2/25/2026, 9:36:45 PM
Last enriched: 2/27/2026, 5:55:39 PM
Last updated: 4/11/2026, 10:17:06 PM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.