The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cleantalk anti-spam
|
|
CPEs | cpe:2.3:a:cleantalk:anti-spam:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Cleantalk anti-spam
|
Tue, 26 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cleantalk
Cleantalk antispam |
|
CPEs | cpe:2.3:a:cleantalk:antispam:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Cleantalk
Cleantalk antispam |
|
Metrics |
ssvc
|
Tue, 26 Nov 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS spoofing on the checkWithoutToken function in all versions up to, and including, 6.43.2. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. | |
Title | Spam protection, Anti-Spam, FireWall by CleanTalk <= 6.43.2 - Authorization Bypass via Reverse DNS Spoofing to Unauthenticated Arbitrary Plugin Installation | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-26T05:33:01.407Z
Updated: 2024-11-26T15:45:22.565Z
Reserved: 2024-10-30T12:40:50.344Z
Link: CVE-2024-10542

Updated: 2024-11-26T15:45:14.487Z

Status : Analyzed
Published: 2024-11-26T06:15:07.683
Modified: 2025-07-12T00:25:44.767
Link: CVE-2024-10542

No data.