The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cleantalk spam Protection\, Antispam\, Firewall
|
|
CPEs | cpe:2.3:a:cleantalk:spam_protection\,_antispam\,_firewall:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Cleantalk spam Protection\, Antispam\, Firewall
|
Tue, 26 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cleantalk
Cleantalk antispam |
|
CPEs | cpe:2.3:a:cleantalk:antispam:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Cleantalk
Cleantalk antispam |
|
Metrics |
ssvc
|
Tue, 26 Nov 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. | |
Title | Spam protection, Anti-Spam, FireWall by CleanTalk <= 6.44 - Authorization Bypass due to Missing Empty Value Check to Unauthenticated Arbitrary Plugin Installation | |
Weaknesses | CWE-703 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-26T05:33:00.910Z
Updated: 2024-11-26T15:52:48.847Z
Reserved: 2024-11-04T13:25:26.646Z
Link: CVE-2024-10781

Updated: 2024-11-26T15:52:44.156Z

Status : Analyzed
Published: 2024-11-26T06:15:08.057
Modified: 2025-07-12T00:24:01.340
Link: CVE-2024-10781

No data.