The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    12 Jul 2025, 00:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L95 - Product | |
| References | () https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L96 - Product | |
| References | () https://plugins.trac.wordpress.org/changeset/3188546/cleantalk-spam-protect#file653 - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae062c-b084-4045-9407-2d94919993af?source=cve - Third Party Advisory | |
| First Time | Cleantalk spam Protection\, Antispam\, Firewall Cleantalk | |
| CPE | cpe:2.3:a:cleantalk:spam_protection\,_antispam\,_firewall:*:*:*:*:*:wordpress:*:* | 
Information
                Published : 2024-11-26 06:15
Updated : 2025-07-12 00:24
NVD link : CVE-2024-10781
Mitre link : CVE-2024-10781
CVE.ORG link : CVE-2024-10781
JSON object : View
Products Affected
                cleantalk
- spam_protection\,_antispam\,_firewall
CWE
                
                    
                        
                        CWE-703
                        
            Improper Check or Handling of Exceptional Conditions
