CVE-2021-24295

HIGH EXPLOITED NUCLEI

Cleantalk Spam Protection, Antispam, Firewall - SQL Injection

Title source: rule

Description

It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.

Nuclei Templates (1)

Spam protection, AntiSpam, FireWall by CleanTalk < 5.153.4 - Unauthenticated Blind SQL Injection
HIGHVERIFIEDby DhiyaneshDK
FOFA: body="/plugin/cleantalk-spam-protect/"

Scores

CVSS v3 7.5
EPSS 0.4056
EPSS Percentile 97.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2021-05-03
CWE
CWE-89
Status published
Products (1)
cleantalk/spam_protection\,_antispam\,_firewall < 5.153.4
Published May 17, 2021
Tracked Since Feb 18, 2026