Input validation vulnerability in WordPress SMTP Service, Email Delivery Solved! — MailHawk 1.3.1

The MailHawk plugin for WordPress, which helps with email delivery, has a security issue in versions up to 1.3.1. This means that people who are not logged in can access and run any files on the server, including PHP code. This can be used to get around security measures, access private information, or run code on the server.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.