CVE-2026-6963: WordPress WP Mail Gateway Plugin Allows Privilege Escalation
The WP Mail Gateway plugin for WordPress, in all versions up to and including 1.8, is vulnerable to unauthorized access, as reported by the National Vulnerability Database. The flaw, identified as CVE-2026-6963, stems from a missing capability check on the wmg_save_provider_config AJAX action. This oversight enables authenticated attackers with even Subscriber-level access to manipulate SMTP settings.
This isn’t just a configuration tweak; it’s a critical privilege escalation vector. By redirecting mail, an attacker can trigger password reset emails for administrative accounts, capture them, and subsequently gain full control. The National Vulnerability Database has assigned a CVSS score of 8.8 (HIGH) to this vulnerability, underscoring its severe impact on confidentiality, integrity, and availability.
Defenders need to treat this with urgency. A high-severity vulnerability that allows low-privileged users to hijack administrator accounts is a clear and present danger. It bypasses conventional access controls and directly targets the most critical user roles in a WordPress environment. The attacker’s calculus here is simple: find a WordPress site using this plugin, get a basic user account, and then elevate to admin with minimal effort.
What This Means For You
- If your organization uses the WP Mail Gateway plugin for WordPress, check your version immediately. Patch to a remediated version if available, or disable the plugin if no patch exists. Audit your WordPress user logs for any suspicious activity, especially password reset requests for administrator accounts, and review your SMTP settings for unauthorized changes. This is a direct path to full site compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6963: WP Mail Gateway AJAX Action Unauthorized Configuration Update
title: CVE-2026-6963: WP Mail Gateway AJAX Action Unauthorized Configuration Update
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
Detects the specific AJAX action 'wmg_save_provider_config' called via '/wp-admin/admin-ajax.php' which is vulnerable in WP Mail Gateway versions up to 1.8. This action, when exploited, allows authenticated users with subscriber-level access to modify SMTP settings, potentially leading to privilege escalation by intercepting password reset emails.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-6963/
tags:
- attack.privilege_escalation
- attack.t1078.004
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-uri-query|contains:
- 'action=wmg_save_provider_config'
cs-method|exact:
- 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6963 | Auth Bypass | WP Mail Gateway plugin for WordPress versions <= 1.8 |
| CVE-2026-6963 | Privilege Escalation | Missing capability check on wmg_save_provider_config AJAX action |
| CVE-2026-6963 | Misconfiguration | Authenticated attackers (Subscriber-level and above) can update SMTP settings |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 08:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.