LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1490 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: February 15, 2026

CleanTalk Spam protection, Anti-Spam, FireWall - Authorization Bypass

Published: February 15, 2026Updated: February 15, 2026PoC AvailableRemote Exploitable

Overview

CleanTalk Spam protection, Anti-Spam, FireWall WordPress plugin <= 6.71 contains an authorization bypass via reverse DNS spoofing in 'checkWithoutToken', letting unauthenticated attackers install arbitrary plugins, exploit requires invalid API key.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 8.4%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can install and activate arbitrary plugins, potentially leading to remote code execution if other vulnerable plugins exist.

Mitigation

Update to the latest version beyond 6.71.

Social Media Activity(3 posts)

Undercode News
Undercode News
@undercodenews
Feb 17, 2026

Critical Vulnerability in CleanTalk WordPress Plugin Puts 200,000 Sites at Risk A recently discovered critical vulnerability (CVE-2026-1490, CVSS 9.8) in the CleanTalk WordPress plugin, affecting versions up to 6.71, has raised alarms for the cybersecurity community. This flaw exposes over 200,000 websites to severe threats, allowing unauthenticated attackers to exploit the vulnerability. The attackers could potentially install malicious plugins and execute remote code… https://undercodenews.com/critical-vulnerability-in-cleantalk-wordpress-plugin-puts-200000-sites-at-risk/

View original post
BeyondMachines :verified:
BeyondMachines :verified:
@beyondmachines1
Feb 17, 2026

Critical CleanTalk Plugin Vulnerability Allows WordPress Site Takeover via DNS Spoofing A critical vulnerability in the CleanTalk WordPress plugin (CVE-2026-1490) allows unauthenticated attackers to bypass authorization via Reverse DNS spoofing and install arbitrary plugins, leading to full site takeover. **If you are using ""Spam protection, Anti-Spam, FireWall by CleanTalk", update ASAP. Never rely on DNS records for authentication because they are easily spoofed by attackers.** #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/critical-cleantalk-plugin-vulnerability-allows-wordpress-site-takeover-via-dns-spoofing-v-h-r-b-n/gD2P6Ple2L

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Feb 16, 2026

🔴 CVE-2026-1490 - Critical (9.8) The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unauthorized Arbitrary Plugin Installation due to an authorization bypass via reverse DNS (PTR record) spoofing on the 'checkWithoutToken' function in all ... 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1490/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1490
Severity
Critical
CVSS Score
9.8
Type
broken_access_control
Status
new
EPSS
8.4%
Social Posts
3

CWE

  • CWE-350

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

8.4%Probability of exploitation in the next 30 days