CVE-2026-4162
Missing Authorization in Gravity SMTP Plugin Allows Plugin Deactivation
Publication date: 2026-04-10
Last updated on: 2026-04-10
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gravityforms | gravity_smtp | to 2.1.4 (inc) |
| gravity_forms | gravity_smtp | to 2.1.4 (inc) |
| gravity_forms | gravity_smtp | 2.1.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Gravity SMTP plugin for WordPress, in versions up to and including 2.1.4, has a Missing Authorization vulnerability. This means the plugin does not properly verify whether a user is authorized to perform certain actions.
As a result, authenticated users with subscriber-level access or higher can uninstall and deactivate the plugin and delete plugin options without proper permission.
Additionally, this vulnerability can be exploited through a Cross-Site Request Forgery (CSRF) attack.
How can this vulnerability impact me? :
This vulnerability allows attackers with low-level authenticated access to disable the Gravity SMTP plugin and delete its settings.
Disabling the plugin can disrupt email delivery functionality on your WordPress site, potentially causing loss of important email notifications or communications.
Since the plugin manages email delivery reliability and logging, its deactivation or misconfiguration could lead to undetected email failures or loss of email logs.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability in the Gravity SMTP plugin for WordPress, you should update the plugin to version 2.1.5 or later, which includes important security enhancements addressing this issue.
This update protects against unauthorized actions such as uninstalling, deactivating the plugin, and deleting plugin options by properly verifying user authorization.
The update can be applied via the WordPress admin interface or by downloading it from the Gravity Forms Account if you hold an active Gravity Forms Elite, Nonprofit, or Developer license.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in the Gravity SMTP plugin allows authenticated attackers with subscriber-level access to uninstall, deactivate the plugin, and delete plugin options without proper authorization. This could potentially disrupt email delivery and site functionality.
However, there is no specific information provided in the available context or resources about how this vulnerability directly impacts compliance with common standards and regulations such as GDPR or HIPAA.