CVE-2026-4162
Description
The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and delete plugin options. NOTE: This vulnerability is also exploitable via a Cross-Site Request Forgery vector.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Gravity SMTP for WordPress ≤2.1.4 lacks authorization checks, allowing authenticated attackers (subscriber+) to uninstall, deactivate, and delete plugin options.
The Gravity SMTP plugin for WordPress, up to and including version 2.1.4, is vulnerable to a Missing Authorization flaw. The plugin fails to properly verify that a user is authorized to perform administrative actions, such as uninstalling or deactivating the plugin and deleting its options. This issue stems from insufficient capability checks on the affected endpoints, allowing lower-privileged users to trigger destructive operations.
Exploitation requires an authenticated account with at least subscriber-level access, which is trivial for attackers who have obtained credentials or via self-registration on sites that allow it. Additionally, the vulnerability is also exploitable via a Cross-Site Request Forgery (CSRF) vector, meaning an attacker could trick a logged-in administrator into unknowingly performing the unauthorized actions, broadening the attack surface without needing direct authentication [1].
An attacker successfully exploiting this flaw can uninstall or deactivate the Gravity SMTP plugin, disrupting email sending from the WordPress site. More critically, they can delete plugin options, potentially breaking site functionality or hiding evidence of compromise. Since SMTP settings involve credentials for email services, the ability to delete options might also be leveraged to disrupt configured mail connections, causing email delivery failures.
The vendor released version 2.1.5 on April 10, 2026, which includes the necessary authorization checks to fix this vulnerability. All users are strongly advised to update immediately [1]. No workaround other than updating has been identified, and the vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of publication.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026