Article Details

Scrape Timestamp (UTC): 2024-11-26 13:25:53.663

Source: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html

Original Article Text

Click to Toggle View

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks. Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry a CVSS score of 9.8 out of a maximum of 10.0. They were addressed in versions 6.44 and 6.45 released this month. Installed on over 200,000 WordPress sites, CleanTalk's Spam protection, Anti-Spam, FireWall plugin is advertised as a "universal anti-spam plugin" that blocks spam comments, registrations, surveys, and more. According to Wordfence, both vulnerabilities concern an authorization bypass issue that could allow a malicious actor to install and activate arbitrary plugins. This could then pave the way for remote code execution if the activated plugin is vulnerable of its own. The plugin is "vulnerable to unauthorized Arbitrary Plugin Installation due to a missing empty value check on the 'api_key' value in the 'perform' function in all versions up to, and including, 6.44," security researcher István Márton said, referring to CVE-2024-10781. On the other hand, CVE-2024-10542 stems from an authorization bypass via reverse DNS spoofing on the checkWithoutToken() function. Regardless of the bypass method, successful exploitation of the two shortcomings could allow an attacker to install, activate, deactivate, or even uninstall plugins. Users of the plugin are advised to ensure that their sites are updated to the latest patched version to safeguard against potential threats. The development comes as Sucuri has warned of multiple campaigns that are leveraging compromised WordPress sites to inject malicious code responsible for redirecting site visitors to other sites via bogus ads, skimming login credentials, as well as drop malware that captures admin passwords, redirects to VexTrio Viper scam sites, and execute arbitrary PHP code on the server.

Daily Brief Summary

MALWARE // Critical Flaws in Popular WordPress Plugin Risk 200,000 Sites

Two critical vulnerabilities have been identified in the CleanTalk WordPress plugin, impacting over 200,000 sites by allowing potential remote attacks.

The security flaws, CVE-2024-10542 and CVE-2024-10781, have a high-severity rating of 9.8 and pertain to authorization bypass issues.

Unauthenticated attackers could exploit these vulnerabilities to install, activate, or manipulate arbitrary plugins, which may lead to remote code execution.

The vulnerabilities were patched in the recent updates, versions 6.44 and 6.45, of the plugin.

The compromised plugin functions included are related to spam protection and firewall defenses, which are critical for site security.

Researchers recommend users promptly update their plugin to the latest version to protect their sites from unauthorized access and further exploitation.

The report coincides with warnings about increased malicious campaigns targeting WordPress sites for malicious code injection and data theft.