Critical Vulnerabilities in CleanTalk WordPress Plugin Allow Remote Code Execution

Learn about the importance of patch management to protect WordPress sites from critical vulnerabilities that can lead to remote code execution.

 

Two critical vulnerabilities in the CleanTalk WordPress Anti-Spam plugin, impacting over 200,000 sites, could allow unauthorized attackers to install and activate malicious plugins, potentially leading to remote code execution. The flaws involve authorization bypass issues, one due to a missing value check and another through reverse DNS spoofing. Users are advised to update to the latest versions, 6.44 and 6.45, which address these security issues. The situation coincides with ongoing campaigns exploiting compromised WordPress sites to inject malicious code, posing additional risks.

 

Key Facts

Risks:

Web App/Website Vulnerability, Patch Management, Privilege Escalation

Keywords:

WordPress, CleanTalk, Remote Code Execution, CVE-2024-10542, CVE-2024-10781, Plugin Vulnerability, Authorization Bypass

CVE:

CVE-2024-10542; CVE-2024-10781

Affected:

WordPress, CleanTalk Spam protection, Anti-Spam, FireWall plugin

 

Article Body

Critical Vulnerabilities in WordPress Anti-Spam Plugin

Two significant security flaws have been discovered in the CleanTalk WordPress Anti-Spam plugin, which affects over 200,000 websites. These vulnerabilities could enable attackers to install and enable malicious plugins, leading to potential remote code execution.

Overview of the Vulnerabilities

The vulnerabilities in question have been identified as CVE-2024-10542 and CVE-2024-10781, each with a high CVSS score of 9.8. These flaws have been addressed in plugin versions 6.44 and 6.45, which were released recently.

Plugin Description

The CleanTalk Spam protection, Anti-Spam, and FireWall plugin is a widely-used WordPress plugin designed to block spam comments, registrations, and other unwanted activities. It serves as a "universal anti-spam plugin."

Nature of the Vulnerabilities

Both vulnerabilities could allow attackers to install, activate, deactivate, or even uninstall plugins, making it possible to execute malicious activities on affected websites.

Recommended Actions

Website administrators using the CleanTalk plugin should update to the latest versions, 6.44 or 6.45, to protect against these vulnerabilities and prevent potential exploitation.

Broader Context

These vulnerabilities coincide with ongoing cyber campaigns targeting WordPress sites. Attackers are exploiting compromised sites to inject malicious code, which redirects visitors to fraudulent sites, skims login credentials, and deploys malware to capture admin passwords. The malicious activity can also lead to redirection to scam sites and execution of arbitrary PHP code on servers.

 

Read More

https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html?m=1