CVE-2026-4020: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in RocketGenius Gravity SMTP
CVE-2026-4020 is a high-severity vulnerability in the Gravity SMTP WordPress plugin (up to version 2. 1. 4) that allows unauthenticated attackers to access a REST API endpoint exposing sensitive system information. The endpoint /wp-json/gravitysmtp/v1/tests/mock-data, due to an improperly configured permission callback, returns approximately 365 KB of JSON data containing detailed system configuration, including PHP version, web server details, WordPress version, active plugins and themes, database information, and API keys/tokens. This exposure can aid attackers in reconnaissance and facilitate further attacks. No authentication or user interaction is required to exploit this vulnerability. Although no known exploits are currently reported in the wild, the vulnerability’s ease of exploitation and the sensitivity of the exposed data make it a significant risk. Organizations using Gravity SMTP should prioritize patching or applying mitigations to prevent unauthorized data disclosure.
AI Analysis
Technical Summary
CVE-2026-4020 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Gravity SMTP plugin for WordPress in all versions up to and including 2.1.4. The root cause is a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data that has a permission_callback function which unconditionally returns true, effectively allowing any unauthenticated user to access it. When the query parameter ?page=gravitysmtp-settings is appended, the plugin’s register_connector_data() method is triggered, which populates internal connector data structures. This causes the endpoint to return a large JSON payload (~365 KB) containing a comprehensive system report. The data exposed includes critical configuration details such as PHP version, loaded PHP extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with their versions, the active theme, WordPress configuration details, database table names, and any API keys or tokens configured within the plugin. This information leakage can provide attackers with valuable intelligence to craft targeted attacks, exploit other vulnerabilities, or escalate privileges. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score is 7.5 (High), reflecting the ease of exploitation and the high confidentiality impact, while integrity and availability remain unaffected. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date.
Potential Impact
The exposure of detailed system and configuration information can significantly aid attackers in reconnaissance activities, enabling them to identify software versions, plugins, and API keys that may have other vulnerabilities or misconfigurations. This can lead to targeted attacks such as privilege escalation, code injection, or data breaches. Organizations using the Gravity SMTP plugin are at risk of having their internal environment details leaked to unauthorized parties, which compromises confidentiality and increases the attack surface. The exposure of API keys and tokens is particularly critical as it may allow attackers to impersonate legitimate services or gain unauthorized access to other integrated systems. Although the vulnerability does not directly affect system integrity or availability, the information disclosure can be a stepping stone for more severe attacks. The risk is amplified for organizations with sensitive data or critical infrastructure running WordPress sites with this plugin installed. Attackers do not need any credentials or user interaction, making the threat accessible to any remote adversary scanning for vulnerable endpoints.
Mitigation Recommendations
Immediate mitigation should include disabling or restricting access to the vulnerable REST API endpoint /wp-json/gravitysmtp/v1/tests/mock-data until a patch is available. This can be done by implementing custom permission callbacks that enforce authentication and authorization checks or by using web application firewalls (WAFs) to block unauthenticated requests to this endpoint. Administrators should audit their WordPress installations for the Gravity SMTP plugin and upgrade to a patched version once released by RocketGenius. In the absence of an official patch, applying temporary code-level fixes such as modifying the plugin to require proper permissions on the REST endpoint is recommended. Additionally, organizations should rotate any API keys or tokens that may have been exposed due to this vulnerability. Monitoring web server logs for suspicious access patterns to the REST API endpoint can help detect exploitation attempts. Regular security assessments and plugin updates should be enforced to prevent similar issues. Finally, limiting plugin usage to trusted administrators and minimizing plugin footprint reduces exposure.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2026-4020: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in RocketGenius Gravity SMTP
Description
CVE-2026-4020 is a high-severity vulnerability in the Gravity SMTP WordPress plugin (up to version 2. 1. 4) that allows unauthenticated attackers to access a REST API endpoint exposing sensitive system information. The endpoint /wp-json/gravitysmtp/v1/tests/mock-data, due to an improperly configured permission callback, returns approximately 365 KB of JSON data containing detailed system configuration, including PHP version, web server details, WordPress version, active plugins and themes, database information, and API keys/tokens. This exposure can aid attackers in reconnaissance and facilitate further attacks. No authentication or user interaction is required to exploit this vulnerability. Although no known exploits are currently reported in the wild, the vulnerability’s ease of exploitation and the sensitivity of the exposed data make it a significant risk. Organizations using Gravity SMTP should prioritize patching or applying mitigations to prevent unauthorized data disclosure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4020 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Gravity SMTP plugin for WordPress in all versions up to and including 2.1.4. The root cause is a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data that has a permission_callback function which unconditionally returns true, effectively allowing any unauthenticated user to access it. When the query parameter ?page=gravitysmtp-settings is appended, the plugin’s register_connector_data() method is triggered, which populates internal connector data structures. This causes the endpoint to return a large JSON payload (~365 KB) containing a comprehensive system report. The data exposed includes critical configuration details such as PHP version, loaded PHP extensions, web server version, document root path, database server type and version, WordPress version, all active plugins with their versions, the active theme, WordPress configuration details, database table names, and any API keys or tokens configured within the plugin. This information leakage can provide attackers with valuable intelligence to craft targeted attacks, exploit other vulnerabilities, or escalate privileges. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely over the network. The CVSS v3.1 base score is 7.5 (High), reflecting the ease of exploitation and the high confidentiality impact, while integrity and availability remain unaffected. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date.
Potential Impact
The exposure of detailed system and configuration information can significantly aid attackers in reconnaissance activities, enabling them to identify software versions, plugins, and API keys that may have other vulnerabilities or misconfigurations. This can lead to targeted attacks such as privilege escalation, code injection, or data breaches. Organizations using the Gravity SMTP plugin are at risk of having their internal environment details leaked to unauthorized parties, which compromises confidentiality and increases the attack surface. The exposure of API keys and tokens is particularly critical as it may allow attackers to impersonate legitimate services or gain unauthorized access to other integrated systems. Although the vulnerability does not directly affect system integrity or availability, the information disclosure can be a stepping stone for more severe attacks. The risk is amplified for organizations with sensitive data or critical infrastructure running WordPress sites with this plugin installed. Attackers do not need any credentials or user interaction, making the threat accessible to any remote adversary scanning for vulnerable endpoints.
Mitigation Recommendations
Immediate mitigation should include disabling or restricting access to the vulnerable REST API endpoint /wp-json/gravitysmtp/v1/tests/mock-data until a patch is available. This can be done by implementing custom permission callbacks that enforce authentication and authorization checks or by using web application firewalls (WAFs) to block unauthenticated requests to this endpoint. Administrators should audit their WordPress installations for the Gravity SMTP plugin and upgrade to a patched version once released by RocketGenius. In the absence of an official patch, applying temporary code-level fixes such as modifying the plugin to require proper permissions on the REST endpoint is recommended. Additionally, organizations should rotate any API keys or tokens that may have been exposed due to this vulnerability. Monitoring web server logs for suspicious access patterns to the REST API endpoint can help detect exploitation attempts. Regular security assessments and plugin updates should be enforced to prevent similar issues. Finally, limiting plugin usage to trusted administrators and minimizing plugin footprint reduces exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-11T19:55:54.999Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cb25a7e6bfc5ba1d9a95b6
Added to database: 3/31/2026, 1:38:47 AM
Last enriched: 3/31/2026, 1:53:25 AM
Last updated: 3/31/2026, 3:16:04 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.