Description
The Login Security, FireWall, Malware removal by CleanTalk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the page URL in all versions up to, and including, 2.168 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross-Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the CleanTalk WordPress plugin for versions up to 2.168, where an unauthenticated user can embed arbitrary scripts into a page URL. The plugin stores and later renders this URL without proper sanitization or escaping, causing the injected script to execute in the browsers of any visitor who accesses the affected page. This stored XSS can lead to session hijacking, credential theft, defacement, or malware installation on the client side, reflecting a classic CW-79 weakness.

Affected Systems

Any WordPress site that has the Login Security, FireWall, Malware removal by CleanTalk plugin installed in a version up to and including 2.168 is affected. Sites using newer releases or without the plugin are not impacted.

Risk and Exploitability

With a CVSS score of 7.2, the flaw is considered high severity, affecting confidentiality, integrity, and availability of the web application. The EPSS score of less than 1% indicates low current exploitation rates, though the vulnerability is recognized in multiple advisories and is not listed in the CISA KEV catalog. Attackers can theoretically exploit the flaw by sending a crafted URL to the target; this is inferred from the description, as the entry does not explicitly detail the attack method. Because no authentication is required and the vulnerability is triggered by a simple request, it can be used in targeted or opportunistic attacks, especially against sites with significant user traffic.

Generated by OpenCVE AI on April 22, 2026 at 20:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the CleanTalk plugin to the latest release (any version greater than 2.168); the update removes the stored XSS flaw.
  • If an upgrade cannot be performed immediately, disable or remove the plugin’s page URL handling feature to prevent further storage of malicious scripts.
  • Continuously monitor site traffic for suspicious URL patterns or attempts to exploit the plugin and enforce web‑application firewall rules to reject anomalous requests.

Generated by OpenCVE AI on April 22, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 09 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cleantalk
Cleantalk security & Malware Scan
Wordpress
Wordpress wordpress
Vendors & Products Cleantalk
Cleantalk security & Malware Scan
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 05:00:00 +0000

Type Values Removed Values Added
Description The Login Security, FireWall, Malware removal by CleanTalk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the page URL in all versions up to, and including, 2.168 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Login Security, FireWall, Malware removal by CleanTalk <= 2.168 - Unauthenticated Stored Cross-Site Scripting via Page URL
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Cleantalk Security & Malware Scan
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:40:45.755Z

Reserved: 2025-11-24T13:50:44.912Z

Link: CVE-2025-13604

cve-icon Vulnrichment

Updated: 2025-12-09T15:01:15.885Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:17:35.473

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:00:06Z

Weaknesses