Over 200,000 WordPress Sites at Risk: The Post SMTP Security Comedy of Errors

Over 200,000 WordPress sites are at risk due to a Post SMTP plugin flaw, allowing hackers to hijack admin accounts. Despite a fix in version 3.3.0, many haven’t updated, leaving sites wide open to cyber shenanigans. If you’re using Post SMTP, upgrading isn’t just smart; it’s a digital lifesaver.

Pro Dashboard

Hot Take:

Oh, WordPress… You had one job: emailing reliably, and now you’re moonlighting as a hacker’s dream access point! Imagine a virtual world where your subscribers are no longer just reading your latest blog post, but also sitting on your admin throne while sipping on a cup of data breach latte. Who knew that a plugin meant for sending emails could deliver a side of chaos? It’s like ordering pizza and getting a free box of gremlins! Grab your keyboards, folks, and update that plugin before your subscribers become the new CEOs of your site.

Key Points:

  • More than 200,000 WordPress sites are using a vulnerable version of the Post SMTP plugin.
  • The flaw identified as CVE-2025-24000 has a severity score of 8.8.
  • The vulnerability allows low-privileged users to hijack admin accounts via email logs.
  • A fix was released on June 11, yet only 48.5% of users have updated the plugin.
  • Thousands are still using older, more vulnerable versions of the plugin.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?