TopVuln

High-risk vulnerability digests

CVE-2026-6235

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-04-22 09:16:26
EPSS
<0.1% probability · 9.5th percentile — 2026-05-12
Affected versions
Sendmachine plugin for WordPress <= 1.0.20
Summary
This vulnerability allows unauthenticated attackers to bypass authorization checks in the Sendmachine WordPress plugin. Attackers can overwrite the plugin's SMTP configuration to intercept all outbound emails from the site, including password reset emails. This can easily lead to full administrative takeover of the WordPress site.
Remediation
Update the Sendmachine plugin to the latest patched version immediately. If no patch is available, uninstall the plugin and replace it with a maintained alternative SMTP solution. Audit site configurations for unauthorized changes to SMTP settings.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.