The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
References
Configurations
Configuration 1 (hide)
|
History
12 Jul 2025, 00:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cleantalk spam Protection\, Antispam\, Firewall
Cleantalk |
|
CPE | cpe:2.3:a:cleantalk:spam_protection\,_antispam\,_firewall:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L95 - Product | |
References | () https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L96 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3188546/cleantalk-spam-protect#file653 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae062c-b084-4045-9407-2d94919993af?source=cve - Third Party Advisory |
Information
Published : 2024-11-26 06:15
Updated : 2025-07-12 00:24
NVD link : CVE-2024-10781
Mitre link : CVE-2024-10781
CVE.ORG link : CVE-2024-10781
JSON object : View
Products Affected
cleantalk
- spam_protection\,_antispam\,_firewall
CWE
CWE-703
Improper Check or Handling of Exceptional Conditions