Critical severity9.8NVD Advisory· Published Apr 22, 2026· Updated Apr 22, 2026
CVE-2026-6235
CVE-2026-6235
Description
The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/includes/sendmachine_email_manager.phpnvd
- plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/sendmachine_wp_admin.phpnvd
- plugins.trac.wordpress.org/browser/sendmachine/tags/1.0.20/sendmachine_wp_admin.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/7889e071-84a8-46ec-abe5-5c98980ce275nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 20, 2026 to April 26, 2026)Wordfence Blog · Apr 30, 2026