Description
WordPress Plugin Easy WP SMTP is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Easy WP SMTP version 1.3.9 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.3.9.1 or latest
References
https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/
https://www.freebuf.com/vuls/201588.html
https://plugins.svn.wordpress.org/easy-wp-smtp/trunk/readme.txt
Related Vulnerabilities
WordPress 4.5.x Arbitrary File Deletion Vulnerability (4.5 - 4.5.14)
Drupal Core 4.6.x Security Bypass (4.6.0 - 4.6.3)
Restlet Framework Deserialization of Untrusted Data Vulnerability (CVE-2013-4271)
WordPress Plugin Clever Addons for Elementor Multiple Cross-Site Scripting Vulnerabilities (2.0.15)
WordPress Plugin Simple Sticky Footer Cross-Site Request Forgery (1.3.2)