{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-10781","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-11-04T13:25:26.646Z","datePublished":"2024-11-26T05:33:00.910Z","dateUpdated":"2026-04-08T17:02:11.871Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:02:11.871Z"},"affected":[{"vendor":"cleantalk","product":"Spam protection, Honeypot, Anti-Spam by CleanTalk","versions":[{"version":"0","status":"affected","lessThanOrEqual":"6.44","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated."}],"title":"Spam protection, Anti-Spam, FireWall by CleanTalk <= 6.44 - Authorization Bypass due to Missing Empty Value Check to Unauthenticated Arbitrary Plugin Installation","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/79ae062c-b084-4045-9407-2d94919993af?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L95"},{"url":"https://plugins.trac.wordpress.org/browser/cleantalk-spam-protect/tags/6.44/lib/Cleantalk/ApbctWP/RemoteCalls.php#L96"},{"url":"https://plugins.trac.wordpress.org/changeset/3188546/cleantalk-spam-protect#file653"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-703 Improper Check or Handling of Exceptional Conditions","cweId":"CWE-703","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH"}}],"credits":[{"lang":"en","type":"finder","value":"István Márton"}],"timeline":[{"time":"2024-11-04T00:00:00.000Z","lang":"en","value":"Discovered"},{"time":"2024-11-04T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"time":"2024-11-25T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"affected":[{"vendor":"cleantalk","product":"antispam","cpes":["cpe:2.3:a:cleantalk:antispam:*:*:*:*:*:wordpress:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"6.44","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-26T15:52:09.317943Z","id":"CVE-2024-10781","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-26T15:52:48.847Z"}}]}}