A critical security vulnerability in the “Security & Malware scan by CleanTalk” plugin has left over 30,000 WordPress websites exposed to exploitation.
The vulnerability, identified as CVE-2024-13365, allows unauthenticated attackers to conduct arbitrary file uploads, potentially leading to remote code execution (RCE).
The flaw, assigned a CVSS score of 9.8 (Critical), affects all plugin versions up to and including 2.149. Users are strongly urged to update to the patched version, 2.150, immediately.
The vulnerability arises from the way the plugin handles ZIP file uploads, primarily through the vulnerable checkUploadedArchive() function of the UploadChecker class.
When the plugin scans an uploaded ZIP file for malware, it extracts the archive to a publicly accessible directory in the WordPress uploads folder without adequate authentication checks.
The flaw lies in the fact that the plugin’s file-checking mechanism (spbc_is_user_logged_in()) only verifies the presence of a “wordpress_logged_in” cookie.
This insufficient authentication check allows attackers to bypass restrictions and upload malicious files even when unauthenticated.
Once extracted, attackers can include a malicious PHP script in the ZIP file, which results in executing arbitrary commands on the server.
Moreover, the destination path for these extracted files is determined using the wp_get_upload_dir() function, making the malicious files publicly accessible.
This opens the door for attackers to deploy webshells or other backdoors, granting them full control over the compromised site.
The issue is particularly dangerous because it allows any attacker—without authentication or administrative access—to:
Such attacks could lead to full site compromise, data breaches, or even server-level exploitation, depending on the attacker’s objectives.
Security researcher Lucio Sá, who identified the flaw, has collaborated with CleanTalk to release a patched version (2.150) of the plugin.
WordPress administrators using this plugin must immediately upgrade to this version to mitigate the risk.
For enhanced protection, site owners leveraging WordPress firewalls, such as Wordfence, are advised to enable the “Disable Code Execution for Uploads directory” option.
This can block malicious file execution from the uploads folder, adding an extra layer of defense.
This incident highlights the critical importance of regular plugin updates and robust security practices on WordPress sites.
The 30,000 WordPress sites exposed to exploitation via file upload vulnerability underline the risks associated with unpatched plugins.
Site administrators should act swiftly by updating the plugin and double-checking all security settings to minimize their attack surface in the future.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction…
A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is…
The FBI has issued a warning about a growing threat involving free file conversion tools,…
A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users…
SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the…
A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses…