CVE-2026-1490

CRITICAL

CleanTalk <6.71 - Auth Bypass

Title source: llm

Description

The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all versions up to, and including, 6.71. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. Note: This is only exploitable on sites with an invalid API key.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-1490
nomisec SUSPICIOUS 2 stars
by comthompson30 · poc
https://github.com/comthompson30/CVE-2026-1490

Scores

CVSS v3 9.8
EPSS 0.0005
EPSS Percentile 14.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-350
Status published
Products (1)
cleantalk/Spam protection, Honeypot, Anti-Spam by CleanTalk < 6.71
Published Feb 15, 2026
Tracked Since Feb 18, 2026