WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation
The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.
The WP Mail Gateway plugin, a WordPress extension, contains a vulnerability (CVE-2026-6963) that allows authenticated users with minimal privileges (Subscriber level or higher) to gain administrative access. The flaw resides in the wmg_save_provider_config AJAX action, which lacks proper authorization checks. This omission enables attackers to manipulate SMTP settings, redirect outgoing emails, and ultimately trigger password reset emails intended for administrators. The vulnerability affects all versions of the WP Mail Gateway plugin up to and including version 1.8. Successful exploitation grants attackers complete control over the WordPress site, making it a critical security concern for any organization using the vulnerable plugin.
Attack Chain
- An attacker logs into a WordPress site with a Subscriber-level account or higher.
- The attacker crafts a malicious AJAX request targeting the
wmg_save_provider_configaction. - This request modifies the SMTP settings, redirecting outgoing emails to an attacker-controlled server.
- The attacker initiates a password reset request for an administrator account.
- The password reset email is intercepted by the attacker’s server.
- The attacker uses the password reset link to gain access to the administrator’s account.
- The attacker logs into the WordPress dashboard with administrator privileges.
- The attacker can now perform any administrative action, including installing malicious plugins, modifying site content, or creating new administrator accounts.
Impact
Successful exploitation of CVE-2026-6963 allows an attacker to completely compromise a WordPress website. Even low-privileged users can elevate their access to administrator, giving them full control over the site. This can lead to data breaches, website defacement, malware deployment, and other malicious activities. The vulnerability affects all installations of the WP Mail Gateway plugin up to version 1.8, potentially impacting thousands of WordPress sites.
Recommendation
- Upgrade the WP Mail Gateway plugin to a version beyond 1.8 to patch CVE-2026-6963.
- Monitor WordPress logs for suspicious AJAX requests targeting the
wmg_save_provider_configaction using the Sigma rule provided below. Enable webserver logging to capture HTTP POST requests. - Implement the provided Sigma rule to detect modifications to WordPress options related to SMTP configuration. Enable relevant logging for registry modifications.
Detection coverage 2
Detect Suspicious AJAX Request to wmg_save_provider_config
highDetects unauthorized AJAX requests to the wmg_save_provider_config endpoint, indicating potential exploitation of CVE-2026-6963
Detect Modification of WordPress SMTP Options
mediumDetects changes to WordPress options related to SMTP configuration, potentially indicating exploitation of the vulnerability.
Detection queries are kept inside the platform. Get full rules →