Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4020: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in RocketGenius Gravity SMTP

0
High
VulnerabilityCVE-2026-4020cvecve-2026-4020cwe-200
Published: Tue Mar 31 2026 (03/31/2026, 01:24:57 UTC)
Source: CVE Database V5
Vendor/Project: RocketGenius
Product: Gravity SMTP

Description

CVE-2026-4020 is a high-severity vulnerability in the Gravity SMTP WordPress plugin (up to version 2. 1. 4) that allows unauthenticated attackers to access a REST API endpoint exposing sensitive system information. The endpoint /wp-json/gravitysmtp/v1/tests/mock-data, due to an improperly configured permission callback, returns approximately 365 KB of JSON data containing detailed system configuration, including PHP version, web server details, WordPress version, active plugins and themes, database information, and API keys/tokens. This exposure can aid attackers in reconnaissance and facilitate further attacks. No authentication or user interaction is required to exploit this vulnerability. Although no known exploits are currently reported in the wild, the vulnerability’s ease of exploitation and the sensitivity of the exposed data make it a significant risk. Organizations using Gravity SMTP should prioritize patching or applying mitigations to prevent unauthorized data disclosure.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 01:53:25 UTC

Technical Analysis

CVE-2026-4020 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Gravity SMTP plugin for WordPress in all versions up to and including 2.1.4. The root cause is a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data that has a permission_callback function which unconditionally returns true, effectively allowing any unauthenticated user to access it. When the query parameter ?page=gravitysmtp-settings is appended, the plugin’s register_connector_data() method is triggered, which populates internal connector data structures. This causes the endpoint to return a large JSON payload (~365 KB) containing a comprehensive system report. The data exposed includes critical configuration details such as PHP version, loaded PHP extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with their versions, the active theme, WordPress configuration details, database table names, and any API keys or tokens configured within the plugin. This information leakage can provide attackers with valuable intelligence to craft targeted attacks, exploit other vulnerabilities, or escalate privileges. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score is 7.5 (High), reflecting the ease of exploitation and the high confidentiality impact, while integrity and availability remain unaffected. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The exposure of detailed system and configuration information can significantly aid attackers in reconnaissance activities, enabling them to identify software versions, plugins, and API keys that may have other vulnerabilities or misconfigurations. This can lead to targeted attacks such as privilege escalation, code injection, or data breaches. Organizations using the Gravity SMTP plugin are at risk of having their internal environment details leaked to unauthorized parties, which compromises confidentiality and increases the attack surface. The exposure of API keys and tokens is particularly critical as it may allow attackers to impersonate legitimate services or gain unauthorized access to other integrated systems. Although the vulnerability does not directly affect system integrity or availability, the information disclosure can be a stepping stone for more severe attacks. The risk is amplified for organizations with sensitive data or critical infrastructure running WordPress sites with this plugin installed. Attackers do not need any credentials or user interaction, making the threat accessible to any remote adversary scanning for vulnerable endpoints.

Mitigation Recommendations

Immediate mitigation should include disabling or restricting access to the vulnerable REST API endpoint /wp-json/gravitysmtp/v1/tests/mock-data until a patch is available. This can be done by implementing custom permission callbacks that enforce authentication and authorization checks or by using web application firewalls (WAFs) to block unauthenticated requests to this endpoint. Administrators should audit their WordPress installations for the Gravity SMTP plugin and upgrade to a patched version once released by RocketGenius. In the absence of an official patch, applying temporary code-level fixes such as modifying the plugin to require proper permissions on the REST endpoint is recommended. Additionally, organizations should rotate any API keys or tokens that may have been exposed due to this vulnerability. Monitoring web server logs for suspicious access patterns to the REST API endpoint can help detect exploitation attempts. Regular security assessments and plugin updates should be enforced to prevent similar issues. Finally, limiting plugin usage to trusted administrators and minimizing plugin footprint reduces exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-11T19:55:54.999Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cb25a7e6bfc5ba1d9a95b6

Added to database: 3/31/2026, 1:38:47 AM

Last enriched: 3/31/2026, 1:53:25 AM

Last updated: 3/31/2026, 3:16:04 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses