Two critical security vulnerabilities affecting the Spam Protection, Anti-Spam, and FireWall plugin for WordPress could enable unauthenticated attackers to install and activate malicious plugins on vulnerable websites, potentially leading to remote code execution (RCE).
Vulnerabilities Overview
The flaws, identified as CVE-2024-10542 and CVE-2024-10781, both carry a CVSS score of 9.8, signaling their severity. Fixes for these vulnerabilities were included in plugin versions 6.44 and 6.45, released this month.
CleanTalk's plugin, installed on over 200,000 WordPress sites, is marketed as a universal solution to block spam in comments, registrations, surveys, and more.
Details of the Flaws
Security researcher István Márton noted that this could open the door for attackers to exploit vulnerable plugins further.
Regardless of the method exploited, attackers can install, activate, deactivate, or uninstall plugins, potentially gaining full control of a site.
User Advisory
Website administrators using the plugin are urged to update to the latest patched version to safeguard against these serious threats. Failure to update leaves sites exposed to exploitation, including unauthorized access and malware installation.
Related Threats
This discovery coincides with warnings from Sucuri, highlighting multiple campaigns targeting compromised WordPress sites. These attacks aim to:
Regular updates and monitoring are critical to maintaining a secure WordPress environment.
© 2016 - 2025 Red Secure Tech Ltd. Registered in England and Wales under Company Number: 15581067