DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2026-6235

Critical
Low Medium High Critical
9.8
CVSS Score
Published: Apr 22, 2026
Last Modified: Apr 22, 2026

Vulnerability Description

The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
H
Availability
H

Severity Details

9.8
out of 10.0
Critical

Weakness Type (CWE)

CWE-862 Top 25 #8

Missing Authorization

Description
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Exploit Likelihood
High
Typical Severity
High
OWASP Top 10
A01:2021-Broken Access Control
Abstraction Level
Class

Key Information

Published Date
April 22, 2026