WordPress Releases Fix for Critical Vulnerability Impacting Anti-Spam Plugin (CVE-2024-10542) – Qualys ThreatPROTECT
Common Information
Type Value
UUID 0edbe0c6-796e-40d1-829b-0417214263e8
Fingerprint d4311496d331b606
Analysis status DONE
Considered CTI value 0
Text language
Published Nov. 28, 2024, 5:04 a.m.
Added to db Nov. 28, 2024, 2:23 p.m.
Last updated Dec. 12, 2024, 10:46 a.m.
Headline WordPress Releases Fix for Critical Vulnerability Impacting Anti-Spam Plugin (CVE-2024-10542)
Title WordPress Releases Fix for Critical Vulnerability Impacting Anti-Spam Plugin (CVE-2024-10542) – Qualys ThreatPROTECT
Detected Hints/Tags/Attributes 11/1/4
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 254 Qualys ThreatPROTECT https://threatprotect.qualys.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 10
cve-2024-10542
Details CVE 10
cve-2024-10781
Details Url 1
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/cleantalk-spam-protect/spam-protection-anti-spam-firewall-by-cleantalk-644-authorization-bypass-due-to-missing-empty-value-check-to-unauthenticated-arbitrary-plugin-installation
Details Url 1
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/cleantalk-spam-protect/spam-protection-anti-spam-firewall-by-cleantalk-6432-authorization-bypass-via-reverse-dns-spoofing-to-unauthenticated-arbitrary-plugin-installation