Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical flaws in WordPress anti-spam plugin expose more than 200,000 sites to remote attacks
Global Security

Critical flaws in WordPress anti-spam plugin expose more than 200,000 sites to remote attacks

AdminBy AdminNovember 26, 2024No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 26, 2024Ravi LakshmananWebsite Vulnerability / Security

Two critical security flaws affecting spam protection, the anti-spam plugin, and the WordPress firewall could allow unauthenticated attackers to install and enable malicious plugins on sensitive sites and potentially achieve remote code execution.

Vulnerabilities tracked as CVE-2024-10542 and CVE-2024-10781have a CVSS score of 9.8 out of a maximum of 10.0. These were addressed in versions 6.44 and 6.45 released this month.

Installed on over 200,000 WordPress sites, CleanTalk Spam Protection, Anti-Spam and FireWall Plugin is advertised as an “all-in-one anti-spam plugin” that blocks spam comments, signups, surveys, and more.

Cyber ​​security

According to Wordfence, both vulnerabilities relate to an authorization bypass issue that could allow an attacker to install and activate arbitrary plugins. This can then open the way for remote code execution if the activated plugin is itself vulnerable.

The plugin is “vulnerable to unauthorized arbitrary plugin installation due to the lack of an empty check for the ‘api_key’ value in the ‘execute’ function in all versions up to and including 6.44,” security researcher István Martan said. saidciting CVE-2024-10781.

On the other hand, CVE-2024-10542 results from bypassing authorization via reverse DNS spoofing in the checkWithoutToken() function.

Regardless of the bypass method, successful exploitation of these two flaws could allow an attacker to install, activate, deactivate, or even uninstall plug-ins.

Cyber ​​security

Users of the plugin are advised to ensure that their sites are updated to the latest version with patches to protect against potential threats.

Development is happening, as Sukuri warned multiple companies which use compromised WordPress sites to inject malicious code responsible for redirecting site visitors to other sites through false advertising, skimming login credentialsas well as remove malware which captures admin passwords redirects to VexTrio Viper Scam Sitesand execute arbitrary PHP code on the server.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025

Testing the handle only to meet the requirements? Time to change your approach

May 15, 2025

5 BCDR Essentials for Effective Rushing

May 15, 2025

New Chrome vulnerability allows for a cross -out data leak through a forklift policy

May 15, 2025

Bion and Ransomexx Exploit SAP Netweaver Nafice for deploying Pipemagic Trojan

May 14, 2025

Samsung Patches Cve-2025-4632 used to deploy Mirai Botnet via Magicinfo 9 Exploit

May 14, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025

Russia related to APT28, exploited by Mdaemon Zero-Day to crack up web-shaped servers

May 15, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.