Skip to main content

Command Palette

Search for a command to run...

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Updated
2 min read
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

_Nov 26, 2024_Ravie LakshmananVulnerability / Website Security

Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin for WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution.

The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0. They were addressed in versions 6.44 and 6.45 released this month.

Installed on over 200,000 WordPress sites, CleanTalk's Spam protection,f Anti-Spam, FireWall plugin is advertised as a "universal anti-spam plugin" that blocks spam comments, registrations, surveys, and more.

According to Wordfence, both vulnerabilities concern an authorization bypass issue that could allow a malicious actor to install and activate arbitrary plugins. This could then pave the way for remote code execution if the activated plugin is vulnerable of its own.

The plugin is "vulnerable to unauthorized Arbitrary Plugin Installation due to a missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44," security researcher István Márton said, referring to CVE-2024-10781.

On the other hand, CVE-2024-10542 stems from an authorization bypass via reverse DNS spoofing on the checkWithoutToken() function.

Regardless of the bypass method, successful exploitation of the two shortcomings could allow an attacker to install, activate, deactivate, or even uninstall plugins.

Users of the plugin are advised to ensure that their sites are updated to the latest patched version to safeguard against potential threats.

The development comes as Sucuri has warned of multiple campaigns that are leveraging compromised WordPress sites to inject malicious code responsible for redirecting site visitors to other sites via bogus ads, skimming login credentials, as well as dropping malware that captures admin passwords, redirects to VexTrio Viper scam sites, and executes arbitrary PHP code on the server.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

SHARE

__Tweet

__Share

__Share

__Share

__Share on Facebook __Share on Twitter __Share on Linkedin __Share on Reddit __Share on Hacker News __Share on Email __Share on WhatsApp Share on Facebook Messenger __Share on Telegram

SHARE

Anti-SpamcybersecurityFirewallPatch Managementremote code executionVulnerabilityWordPressWordPress plugin

More from this blog

F

FPT Metrodata Indonesia Cyber Security

620 posts

FPT Metrodata Indonesia (FMI) provides news, analysis & guides on cybersecurity and threat intelligence for Indonesia & Vietnam. Visit https://news.fmisec.com. FMI: https://fmisec.com

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks