The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
References
Configurations
History
12 Jul 2025, 00:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cleantalk:anti-spam:*:*:*:*:*:wordpress:*:* | |
First Time |
Cleantalk
Cleantalk anti-spam |
|
References | () https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.43.2/lib/Cleantalk/ApbctWP/RemoteCalls.php#L41 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3179819/cleantalk-spam-protect#file631 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/d7eb5fad-bb62-4f0b-ad52-b16c3e442b62?source=cve - Third Party Advisory |
Information
Published : 2024-11-26 06:15
Updated : 2025-07-12 00:25
NVD link : CVE-2024-10542
Mitre link : CVE-2024-10542
CVE.ORG link : CVE-2024-10542
JSON object : View
Products Affected
cleantalk
- anti-spam
CWE
CWE-862
Missing Authorization