FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider 2.2.80

    Fixed

    The FluentSMTP plugin for WordPress has a security issue in versions 2.2.80 and below. This is because it does not properly check for a unique code when performing certain actions. This means that so...

    Read More
  • Input validation vulnerability in FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider 2.2.82

    Fixed

    A popular WordPress plugin called FluentSMTP, which helps with sending emails using various providers, has a security issue. This issue can allow hackers to insert malicious code into the plugin, giv...

    Read More
  • Input validation vulnerability in FluentSMTP – WP Mail SMTP, Amazon SES, SendGrid, MailGun and Any SMTP Connector Plugin 2.2.4

    Fixed

    The FluentSMTP plugin for WordPress is a security risk in versions up to, and including, 2.2.4. Without proper input sanitization and output escaping, malicious attackers could inject web scripts int...

    Read More
  • Input validation vulnerability in FluentSMTP – WP Mail SMTP, Amazon SES, SendGrid, MailGun and Any SMTP Connector Plugin 2.0.1

    Fixed

    The FluentSMTP WordPress plugin had a security issue before version 2.0.1. It did not filter or protect the settings that are stored in the database. If someone with the correct permissions viewed the...

    Read More
  • Input validation vulnerability in FluentSMTP – WP Mail SMTP, Amazon SES, SendGrid, MailGun and Any SMTP Connector Plugin 2.2.2

    Fixed

    The FluentSMTP plugin for WordPress is not secure in versions up to 2.2.3. It does not properly check what is sent and how it is shown. This means that malicious people can add harmful code to webpage...

    Read More