30,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in CleanTalk Plugin
WordPress Hacked

Introduction
WordPress is the most popular content management system (CMS) in the world, powering more than 40% of all websites. While its flexibility and extensive plugin ecosystem make it a powerful tool, it also makes it a prime target for cyber threats. A recent security vulnerability discovered in the Security & Malware scan by CleanTalk plugin highlights the importance of staying vigilant and keeping WordPress sites updated. This article explores the newly identified Arbitrary File Upload vulnerability in CleanTalk’s Security & Malware scan plugin, its impact, and how website administrators can protect their sites.
Overview of the Vulnerability
On December 7, 2024, a security researcher discovered and reported an Arbitrary File Upload vulnerability in the CleanTalk Security & Malware scan WordPress plugin. This plugin has over 30,000 active installations, making it a significant risk to many websites. The vulnerability allows an unauthenticated attacker to upload arbitrary files to a vulnerable site, potentially leading to remote code execution (RCE). Such an exploit could enable attackers to take full control of affected WordPress sites, deploy malware, steal data, and disrupt website functionality.
How the Vulnerability Works
An Arbitrary File Upload vulnerability occurs when a website does not properly validate or restrict file types uploaded by users. In the case of CleanTalk’s Security & Malware scan plugin, attackers can exploit the flaw by uploading malicious scripts, such as PHP files, that can then be executed on the server.
Once an attacker uploads a malicious file, they can execute commands remotely, giving them complete control over the compromised website. This type of vulnerability is particularly dangerous because it can be exploited without authentication, meaning even sites without user registration enabled are at risk.
Potential Risks and Consequences
Given the popularity of WordPress and the CleanTalk plugin, this vulnerability poses a severe threat to website security. Here are some of the potential impacts:
Website Defacement: Attackers could alter website content, replace pages with malicious messages, or redirect visitors to harmful websites.
Data Theft: Sensitive user information, including login credentials and customer data, could be stolen.
Malware Distribution: Compromised sites could be used to distribute malware to visitors, leading to further infections.
SEO Damage: Search engines may flag infected websites as malicious, leading to ranking drops and loss of traffic.
Financial Loss: A hacked website can result in business downtime, loss of revenue, and costly remediation efforts.
Reputation Damage: Users and customers may lose trust in a website that has been compromised, which can have long-term effects on business credibility.
Response and Patch Release
Upon discovery, the vulnerability was responsibly reported, leading to the following actions:
January 14, 2025: A firewall rule was deployed to block exploits targeting this vulnerability.
February 13, 2025: Free users received the same firewall protection 30 days later.
Patch Release: CleanTalk addressed the vulnerability in version 2.150 of the Security & Malware scan plugin.
Website administrators using this plugin are strongly urged to update to the latest version immediately to mitigate the risk of exploitation.
Steps to Protect Your WordPress Site
1. Update the CleanTalk Plugin
If your site uses the Security & Malware scan by CleanTalk plugin, update it to version 2.150 or later as soon as possible.
2. Use a Web Application Firewall (WAF)
A security solution can help block malicious requests targeting known vulnerabilities before they reach your site.
3. Limit File Upload Permissions
Restrict file upload permissions to trusted users and configure your server to block the execution of uploaded scripts.
4. Regularly Scan for Malware
Use security plugins to conduct regular scans for malware and other vulnerabilities.
5. Implement Strong Access Controls
Ensure that your site’s admin panel is protected with strong passwords, two-factor authentication (2FA), and limited login attempts.
6. Backup Your Website Regularly
Having a recent backup ensures that you can restore your site quickly if it becomes compromised.
7. Monitor Traffic and Logs
Monitoring your website’s traffic and logs can help detect unusual activity that might indicate an attempted attack.
8. Disable Unused Features and Plugins
Remove any unnecessary plugins or themes that are not in use, as they can be potential attack vectors.
9. Use Secure Hosting
Choose a hosting provider that implements strong security measures, including server-side firewalls and malware scanning.
10. Educate Your Team
Ensure that anyone with access to your website understands basic security practices to minimize risks from human errors.
Importance of WordPress Security Research
The discovery of this vulnerability highlights the critical role of security researchers and bug bounty programs in keeping the web safe. Security research plays a crucial role in protecting millions of websites from emerging threats. Ethical hackers and researchers contribute significantly to identifying and mitigating security vulnerabilities before they can be exploited by malicious actors.
Organizations that invest in security research and collaborate with ethical hackers help protect websites from vulnerabilities that could otherwise go unnoticed. By participating in bug bounty programs, researchers can receive financial rewards while making the internet a safer place.
Final Thoughts
The Arbitrary File Upload vulnerability in the CleanTalk Security & Malware scan plugin underscores the importance of proactive WordPress security management. If you use this plugin, update immediately to the latest patched version (2.150 or newer). Additionally, website owners should implement robust security practices, such as using a WAF, restricting file uploads, and regularly scanning for vulnerabilities.
By staying informed and taking action, WordPress site administrators can significantly reduce the risk of security breaches and keep their websites safe from attackers.
Stay Secure and Keep Your WordPress Site Protected!
About the Creator
WIRE TOR - Ethical Hacking Services
WIRE TOR is a Cyber Intelligence Company that Provides Pentest & Cybersecurity News About IT, Web, Mobile (iOS, Android), API, Cloud, IoT, Network, Application, System, Red teaming, Social Engineering, Wireless, And Source Code.



Comments (1)
Hello, just wanna let you know that if we use AI, then we have to choose the AI-Generated tag before publishing 😊