Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1123: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in solidwp Solid Mail – SMTP email and logging made by SolidWP

0
High
VulnerabilityCVE-2025-1123cvecve-2025-1123cwe-79
Published: Fri May 23 2025 (05/23/2025, 12:22:55 UTC)
Source: CVE
Vendor/Project: solidwp
Product: Solid Mail – SMTP email and logging made by SolidWP

Description

The Solid Mail – SMTP email and logging made by SolidWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email Name, Subject, and Body in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:06:15 UTC

Technical Analysis

CVE-2025-1123 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Solid Mail – SMTP email and logging plugin developed by SolidWP for WordPress. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The issue stems from insufficient sanitization and escaping of user-supplied input fields—specifically the email Name, Subject, and Body—allowing attackers to inject arbitrary JavaScript code that is stored persistently within the plugin’s data. When a legitimate user accesses a page displaying the injected content, the malicious script executes in their browser context. The vulnerability is exploitable remotely without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change with limited confidentiality and integrity impact but no availability impact. The vulnerability affects all versions up to and including 2.1.5 of the plugin. Although no public exploits are currently known, the nature of stored XSS can facilitate session hijacking, credential theft, or further attacks such as privilege escalation or malware distribution. The plugin’s widespread use in WordPress environments makes this a significant concern for website administrators and security teams.

Potential Impact

The primary impact of CVE-2025-1123 is the compromise of confidentiality and integrity for users interacting with affected WordPress sites using the Solid Mail plugin. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, theft of sensitive information such as cookies or credentials, and unauthorized actions performed on behalf of the user. This can result in account compromise, data leakage, and further exploitation of the website or connected systems. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated attackers scanning for vulnerable sites. The scope includes all WordPress sites using the affected plugin versions, which may be significant given WordPress’s global market share. The absence of availability impact means the site remains operational, but the trustworthiness and security of user interactions are undermined. Organizations relying on this plugin for email SMTP and logging functionality face reputational damage, regulatory compliance risks, and potential financial losses if exploited.

Mitigation Recommendations

1. Immediate upgrade: Organizations should update the Solid Mail – SMTP email and logging plugin to a patched version once released by SolidWP. If no patch is available yet, consider temporarily disabling the plugin to prevent exploitation. 2. Input validation and output encoding: Developers and site administrators should ensure that all user-supplied inputs, especially email Name, Subject, and Body fields, are properly sanitized and escaped before rendering in web pages. 3. Web Application Firewall (WAF): Deploy a WAF with rules targeting common XSS payloads to block malicious requests attempting to inject scripts. 4. Content Security Policy (CSP): Implement a strict CSP to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. 5. Monitoring and logging: Enable detailed logging of plugin activity and monitor for unusual input patterns or error messages that may indicate exploitation attempts. 6. User awareness: Educate site administrators and users about the risks of XSS and encourage cautious behavior when interacting with email content or links. 7. Regular security audits: Conduct periodic vulnerability assessments and penetration testing focusing on plugin components and user input handling. 8. Backup and recovery: Maintain regular backups of website data to enable quick restoration in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-07T18:57:25.546Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68306c090acd01a2492722a7

Added to database: 5/23/2025, 12:37:29 PM

Last enriched: 2/27/2026, 12:06:15 PM

Last updated: 3/26/2026, 10:27:01 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses