LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-6963 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: May 2, 2026

WP Mail Gateway WordPress plugin - Authorization Bypass

Published: May 2, 2026Updated: May 2, 2026Remote Exploitable

Overview

WP Mail Gateway WordPress plugin <= 1.8 contains an authorization bypass caused by missing capability check on wmg_save_provider_config AJAX action, letting authenticated attackers with Subscriber-level access update SMTP settings and redirect mail, exploit requires authenticated user with Subscriber-level or higher.

Severity & Score

Severity: High
CVSS Score: 8.8

Impact

Authenticated attackers can update SMTP settings to redirect mail and escalate privileges by triggering password reset emails, potentially gaining administrator access.

Mitigation

Update to the latest version beyond 1.8.

Details

CVE ID
CVE-2026-6963
Severity
High
CVSS Score
8.8
Type
broken_access_control
Status
new

CWE

  • CWE-862

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H