CVSS 3.1 Score 6.1 of 10 (medium)


Published Jan 3, 2024
Updated: Jan 9, 2024


CVE-2023-6621 is a vulnerability that affects the POST SMTP WordPress plugin versions before 2.8.7. This vulnerability allows for Reflected Cross-Site Scripting, which could be exploited against high privilege users like admins. The msg parameter is not properly sanitised and escaped before being outputted on the page, leaving it susceptible to attacks. To remediate this vulnerability, users should update their plugin to version 2.8.7 or later. The potential danger of this vulnerability lies in the ability for attackers to execute malicious scripts on the affected WordPress site, potentially leading to unauthorized access and compromise of sensitive data.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6621 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options