PT-2026-8222 · WordPress · Cleantalk

Duc193

+1

·

Published

2026-02-15

·

Updated

2026-02-26

·

CVE-2026-1490

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions CleanTalk versions up to and including 6.71
Description The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress has a flaw that allows unauthorized Arbitrary Plugin Installation. This is due to an authorization bypass via reverse DNS (PTR record) spoofing within the checkWithoutToken function. Unauthenticated attackers can install and activate arbitrary plugins, potentially leading to remote code execution if another vulnerable plugin is already installed and active. This is exploitable on sites with an invalid API key. Approximately 200,000 sites are potentially affected.
Recommendations Update to version 6.72 or later.

Fix

RCE

Weakness Enumeration

Related Identifiers

CVE-2026-1490

Affected Products

Cleantalk