A critical security vulnerability in the “Security & Malware scan by CleanTalk” plugin has left over 30,000 WordPress websites exposed to exploitation.
The vulnerability, identified as CVE-2024-13365, allows unauthenticated attackers to conduct arbitrary file uploads, potentially leading to remote code execution (RCE).
The flaw, assigned a CVSS score of 9.8 (Critical), affects all plugin versions up to and including 2.149. Users are strongly urged to update to the patched version, 2.150, immediately.
The vulnerability arises from the way the plugin handles ZIP file uploads, primarily through the vulnerable checkUploadedArchive() function of the UploadChecker class.
When the plugin scans an uploaded ZIP file for malware, it extracts the archive to a publicly accessible directory in the WordPress uploads folder without adequate authentication checks.
The flaw lies in the fact that the plugin’s file-checking mechanism (spbc_is_user_logged_in()) only verifies the presence of a “wordpress_logged_in” cookie.
This insufficient authentication check allows attackers to bypass restrictions and upload malicious files even when unauthenticated.
Once extracted, attackers can include a malicious PHP script in the ZIP file, which results in executing arbitrary commands on the server.
Moreover, the destination path for these extracted files is determined using the wp_get_upload_dir() function, making the malicious files publicly accessible.
This opens the door for attackers to deploy webshells or other backdoors, granting them full control over the compromised site.
The issue is particularly dangerous because it allows any attacker—without authentication or administrative access—to:
Such attacks could lead to full site compromise, data breaches, or even server-level exploitation, depending on the attacker’s objectives.
Security researcher Lucio Sá, who identified the flaw, has collaborated with CleanTalk to release a patched version (2.150) of the plugin.
WordPress administrators using this plugin must immediately upgrade to this version to mitigate the risk.
For enhanced protection, site owners leveraging WordPress firewalls, such as Wordfence, are advised to enable the “Disable Code Execution for Uploads directory” option.
This can block malicious file execution from the uploads folder, adding an extra layer of defense.
This incident highlights the critical importance of regular plugin updates and robust security practices on WordPress sites.
The 30,000 WordPress sites exposed to exploitation via file upload vulnerability underline the risks associated with unpatched plugins.
Site administrators should act swiftly by updating the plugin and double-checking all security settings to minimize their attack surface in the future.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm, has…
A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of the…
Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish…
Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion…
Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including…
A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012)…