Over 40,000 web sites working a susceptible model of a well-liked WordPress plugin might be prone to being hijacked by hackers.
The Put up SMTP plugin is an add-on utilized by roughly 400,000 WordPress-powered web sites to enhance the reliability and safety of their e-mail supply. The plugin has confirmed common partially due to its advertising and marketing that presents it as a extra dependable and full-featured alternative to the default e-mail performance constructed into WordPress.
Based on a report by Patchstack, an moral hacker responsibly disclosed a severe vulnerability within the Put up SMTP plugin.
The flaw allowed web site customers who ought to solely have low privileges, reminiscent of Subscribers, to intercept any e-mail despatched by the WordPress web site, together with password reset emails to any consumer. Utilizing this info, a low-privileged consumer would be capable to seize management of an Administrator-level account, resulting in a full website takeover.
Saad Iqbal of WPExperts, the developer of the plugin, took the report significantly and offered a possible patch inside three days which was confirmed to resolve the vulnerability – which had been given the title CVE-2025-24000.
On June 11, Iqbal launched model 3.3.0 of the Put up SMTP plugin, which included the patch for the flaw.
You would possibly suppose this can be a completely satisfied finish to the story – nevertheless it’s not.
You see, the issue is that in response to WordPress.org, over 10% of the plugin’s 400,000+ energetic customers are nonetheless working the susceptible model 3.1 (proven right here in purple).

As Bleeping Laptop studies, a worrying 24.2% of websites (nearly 100,000) are nonetheless working Put up SMTP model 2.x..x – which leaves them open to much more identified vulnerabilities and safety flaws.
So, what are you able to do?
Properly, first issues first. In the event you administer a WordPress web site, replace its plugins.
Any out-of-date plugins may be up to date by visiting your wp-admin dashboard inside WordPress. You may even, in case you are comfy, set WordPress plugins to robotically replace when new variations develop into out there.
Moreover, ask your self what you’re doing to harden your web site and WordPress set up? As an illustration, are you proscribing entry to your web site’s admin interface to particular IP addresses? Do you have got multi-factor authentication in place? Have you ever checked out what plugins and themes you have got put in in your web site, and eliminated any which might be now not required?
Patching is clearly wise and needs to be undertaken on the earliest alternative, however always remember that further layers of safety can transcend patches – and maybe be extra proactive in defending your techniques from assault.