CVE-2026-4162
Received Received - Intake
Missing Authorization in Gravity SMTP Plugin Allows Plugin Deactivation

Publication date: 2026-04-10

Last updated on: 2026-04-10

Assigner: Wordfence

Description
The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and delete plugin options. NOTE: This vulnerability is also exploitable via a Cross-Site Request Forgery vector.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-10
Generated
2026-05-06
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
gravityforms gravity_smtp to 2.1.4 (inc)
gravity_forms gravity_smtp to 2.1.4 (inc)
gravity_forms gravity_smtp 2.1.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Gravity SMTP plugin for WordPress, in versions up to and including 2.1.4, has a Missing Authorization vulnerability. This means the plugin does not properly verify whether a user is authorized to perform certain actions.

As a result, authenticated users with subscriber-level access or higher can uninstall and deactivate the plugin and delete plugin options without proper permission.

Additionally, this vulnerability can be exploited through a Cross-Site Request Forgery (CSRF) attack.


How can this vulnerability impact me? :

This vulnerability allows attackers with low-level authenticated access to disable the Gravity SMTP plugin and delete its settings.

Disabling the plugin can disrupt email delivery functionality on your WordPress site, potentially causing loss of important email notifications or communications.

Since the plugin manages email delivery reliability and logging, its deactivation or misconfiguration could lead to undetected email failures or loss of email logs.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the vulnerability in the Gravity SMTP plugin for WordPress, you should update the plugin to version 2.1.5 or later, which includes important security enhancements addressing this issue.

This update protects against unauthorized actions such as uninstalling, deactivating the plugin, and deleting plugin options by properly verifying user authorization.

The update can be applied via the WordPress admin interface or by downloading it from the Gravity Forms Account if you hold an active Gravity Forms Elite, Nonprofit, or Developer license.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the Gravity SMTP plugin allows authenticated attackers with subscriber-level access to uninstall, deactivate the plugin, and delete plugin options without proper authorization. This could potentially disrupt email delivery and site functionality.

However, there is no specific information provided in the available context or resources about how this vulnerability directly impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart