Plugin Vulnerability Hub
Plugin 5 known issues Latest disclosed Sep 27, 2024

Mail logging – WP Mail Catcher Vulnerabilities

Review known vulnerability records for the WordPress plugin Mail logging – WP Mail Catcher (`wp-mail-catcher`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2024-47339, CVE-2024-32099 and CVE-2023-50844, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
5
High or Critical
2
Patch Coverage
100%
Last Updated
Oct 03, 2024
Priority CVE Quick Links

Fast paths into Mail logging – WP Mail Catcher CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
4
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Mail logging – WP Mail Catcher so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
5 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 2 high severity findings.
Recent CVEs
CVE-2024-47339, CVE-2024-32099 and CVE-2023-50844
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Mail logging – WP Mail Catcher

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2024-47339
CVE-2024-47339: WP Mail Catcher <= 2.1.9 - Reflected Cross-Site Scripting

The WP Mail Catcher plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pag...

Published
Sep 27, 2024
Patched Release
2.1.10
Affected Versions
Versions up to 2.1.9
Next Step
Update to 2.1.10 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-32099
CVE-2024-32099: WP Mail Catcher <= 2.1.6 - Cross-Site Request Forgery

The WP Mail Catcher plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1.6. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to perform unauthorized ac...

Published
Apr 11, 2024
Patched Release
2.1.7
Affected Versions
Versions up to 2.1.6
Next Step
Update to 2.1.7 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-50844
CVE-2023-50844: Mail logging – WP Mail Catcher <= 2.1.3 - Authenticated(Administrator+) SQL Injection

The Mail logging – WP Mail Catcher plugin for WordPress is vulnerable to SQL Injection via an unknown parameter in all versions up to 2.1.4 (exclusive) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This m...

Published
Dec 21, 2023
Patched Release
2.1.4
Affected Versions
Versions before 2.1.4
Next Step
Update to 2.1.4 or newer if supported.
Plugin High Patched: Yes
Mail logging - WP Mail Catcher <= 2.1.3 - Authenticated (Admin+) SQL Injection

The Mail logging – WP Mail Catcher plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 2.1.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This...

Published
Oct 29, 2023
Patched Release
2.1.4
Affected Versions
Versions up to 2.1.3
Next Step
Update to 2.1.4 or newer if supported.
Plugin High Patched: Yes CVE-2023-3080
CVE-2023-3080: WP Mail Catcher <= 2.1.2 - Unauthenticated Stored Cross-Site Scripting via Email Subject

The WP Mail Catcher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary...

Published
Jun 09, 2023
Patched Release
2.1.3
Affected Versions
Versions up to 2.1.2
Next Step
Update to 2.1.3 or newer if supported.