Skip to content
CVSS 8.8 · HIGH

CVE-2026-6963

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update SMTP settings and redirect mail which can be used for privilege escalation by triggering a password reset email and using that to access and administrator's account.

View on NVD

Analysis

The WP Mail Gateway plugin for WordPress allows authenticated subscribers to hijack SMTP settings and escalate privileges by intercepting password resets. While the impact is severe for affected sites, this is a niche plugin with a small install base and does not represent a systemic risk to the broader developer community.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-862

EPSS

Probability of exploitation (next 30 days): 0.0002 (0.0%)
Percentile: 4.9%
EPSS: 2026-05-06

Technical description

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update SMTP settings and redirect mail which can be used for privilege escalation by triggering a password reset email and using that to access and administrator's account.

Published: 5/2/2026, 5:16:01 AM
Last modified: 5/5/2026, 7:17:22 PM

References

HomeEventsBlogResourcesTeam