CVE-2026-6675
Received Received - Intake
Unauthenticated Open Email Relay in Responsive Blocks Plugin

Publication date: 2026-04-21

Last updated on: 2026-04-21

Assigner: Wordfence

Description
The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to Unauthenticated Open Email Relay in all versions up to, and including, 2.2.0. This is due to insufficient authorization checks and missing server-side validation of the recipient email address supplied via a public REST API route. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient of their choosing through the affected WordPress site's mail server, effectively turning the site into an open mail relay.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-21
Generated
2026-05-06
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
responsive_blocks page_builder_for_blocks_and_patterns to 2.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress, affecting all versions up to and including 2.2.0.

It is an Unauthenticated Open Email Relay issue caused by insufficient authorization checks and missing server-side validation of the recipient email address supplied via a public REST API route.

This allows unauthenticated attackers to send arbitrary emails to any recipient through the affected WordPress site's mail server, effectively turning the site into an open mail relay.


How can this vulnerability impact me? :

This vulnerability can be exploited by attackers to send arbitrary emails through your WordPress site's mail server without authentication.

As a result, your site could be used to send spam or malicious emails, potentially damaging your domain's reputation and leading to blacklisting by email providers.

It may also increase the risk of your server being involved in phishing or other email-based attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to use the affected WordPress site as an open mail relay to send arbitrary emails. This could potentially lead to misuse of the site’s mail server for spam or phishing attacks.

However, there is no specific information provided about direct impacts on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart