CleanTalk WordPress Plugin Flaw Exposes 200K Sites to Takeover
Critical CVE-2026-1490 (CVSS 9.8) in CleanTalk anti-spam plugin allows unauthenticated attackers to install malicious plugins via DNS spoofing. Update to 6.72 now.
A critical vulnerability in a widely-used WordPress anti-spam plugin could allow attackers to completely compromise websites without authentication. The flaw, tracked as CVE-2026-1490, carries a CVSS score of 9.8 and affects over 200,000 WordPress installations running the CleanTalk "Spam protection, Honeypot, Anti-Spam" plugin.
What Makes This Vulnerability Dangerous
The issue stems from a surprisingly simple oversight: the plugin's checkWithoutToken function relies on reverse DNS (PTR) record verification to authenticate incoming requests when a valid API key isn't present. Attackers can spoof these PTR records to impersonate cleantalk.org, bypassing all authorization checks.
Once past this barrier, attackers can install and activate arbitrary plugins on the target WordPress site. While CVE-2026-1490 doesn't directly enable remote code execution, the ability to install any plugin—including known-vulnerable or outright malicious ones—effectively hands over the keys to the kingdom.
Security researcher Nguyen Ngoc Duc (duc193) of KCSC discovered the flaw and reported it through Wordfence Intelligence.
How the Attack Works
The exploitation path is straightforward:
- Attacker identifies a WordPress site running CleanTalk with an invalid or missing API key
- Attacker spoofs reverse DNS records to appear as if requests originate from cleantalk.org
- The plugin's authorization check accepts the spoofed identity
- Attacker uses this access to install a backdoor plugin or known-vulnerable component
- Full site compromise follows
The reliance on PTR records for security decisions is a textbook example of CWE-350—trusting reverse DNS resolution for security-critical actions. DNS records are inherently spoofable, making this approach fundamentally flawed.
Who's Actually Vulnerable
Here's the silver lining: only CleanTalk installations configured with invalid API keys are susceptible. Sites using valid, properly configured API keys aren't affected by this specific bypass.
That said, the "invalid API key" scenario is more common than you might expect. Trial installations, staging environments, sites where subscriptions lapsed, or configurations migrated between servers can all end up in this state. The 200,000+ installation figure represents the total install base—the vulnerable subset is smaller but still significant.
This vulnerability follows a pattern we've seen repeatedly in WordPress plugins. Last year, a similar authorization bypass in Service Finder allowed unauthenticated admin account creation. And just months ago, ACF Extended suffered a comparable flaw that enabled privilege escalation.
Affected Versions and Patch Status
| Component | Details |
|---|---|
| Vulnerable versions | 6.71 and earlier |
| Patched version | 6.72+ |
| CVSS v3.1 score | 9.8 (Critical) |
| Attack vector | Network, no authentication required |
| User interaction | None |
CleanTalk addressed the issue in version 6.72 by implementing verification beyond PTR records. The fix was released on February 17, 2026, giving site administrators a narrow window to update before details became public.
Recommended Actions
For WordPress administrators:
- Update the CleanTalk plugin to version 6.72 or later immediately
- Verify your CleanTalk API key is valid and properly configured
- Review installed plugins for any unexpected additions
- Check user accounts for unauthorized admin users
- Consider implementing Web Application Firewall rules that block suspicious plugin installation attempts
For security teams:
If you manage multiple WordPress sites, prioritize auditing CleanTalk configurations. The combination of high severity, low attack complexity, and no required authentication makes this an attractive target. Automated scanning for this vulnerability is likely already underway.
Why This Matters
WordPress powers over 40% of the web, and its plugin ecosystem is both a strength and a persistent security liability. CleanTalk alone protects 200,000+ sites—that's a substantial attack surface when a critical flaw emerges.
The DNS spoofing angle is particularly concerning because it bypasses traditional authentication entirely. No stolen credentials, no session hijacking, no social engineering required. Just forge a PTR record and walk right in.
Organizations relying on WordPress for business-critical applications should treat this as a reminder: plugin updates aren't optional maintenance. They're security patches that close actively exploitable holes. The time between disclosure and exploitation continues to shrink, and threat actors are watching the same advisory feeds that defenders monitor.
If your WordPress installations haven't been updated since February 17, start there. Check your CleanTalk version, verify your API configuration, and audit for any signs of compromise. The attackers won't wait for you to catch up.
Related Articles
WordPress Service Finder Plugin Exploit Hits 13,800 Sites
Attackers exploiting CVE-2025-5947 in Service Finder Bookings plugin to hijack admin accounts through cookie manipulation. Over 6,000 sites potentially exposed.
Feb 4, 2026WordPress Plugin Flaw Gives Attackers Admin Access Without Login
CVE-2026-23550 in Modular DS plugin scores CVSS 10.0. Active exploitation began January 13, with 40,000+ sites at risk.
Jan 28, 2026WordPress ACF Extended Bug Lets Anyone Become Admin
CVE-2025-14533 in the ACF Extended plugin allows unauthenticated attackers to register as administrators on 100,000 WordPress sites.
Jan 21, 2026Claude Code Flaws Let Malicious Repos Steal API Keys, Run Code
Check Point found CVE-2025-59536 and CVE-2026-21852 in Anthropic's Claude Code. Opening a cloned repo could execute code and leak API credentials.
Feb 26, 2026