CVE-2021-24295
HIGH EXPLOITED NUCLEICleantalk Spam Protection, Antispam, Firewall - SQL Injection
Title source: ruleDescription
It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.
Nuclei Templates (1)
Spam protection, AntiSpam, FireWall by CleanTalk < 5.153.4 - Unauthenticated Blind SQL Injection
HIGHVERIFIEDby DhiyaneshDK
FOFA:
body="/plugin/cleantalk-spam-protect/"
Scores
CVSS v3
7.5
EPSS
0.4056
EPSS Percentile
97.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2021-05-03
CWE
CWE-89
Status
published
Products (1)
cleantalk/spam_protection\,_antispam\,_firewall
< 5.153.4
Published
May 17, 2021
Tracked Since
Feb 18, 2026