CVE-2025-24628

5.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to bypass CAPTCHA verification in the BestWebSoft Google Captcha WordPress plugin, enabling identity spoofing and potentially unauthorized access to protected forms or login systems. It affects all WordPress sites using this plugin from any version up to 1.78.

💻 Affected Systems

Products:
  • BestWebSoft Google Captcha (reCAPTCHA by BestWebSoft) WordPress plugin
Versions: All versions up to and including 1.78
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin enabled and configured to use CAPTCHA protection.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could submit spam through contact forms, brute-force login pages without rate limiting, or bypass authentication on forms protected by this CAPTCHA, potentially leading to account takeover or data exfiltration.

🟠

Likely Case

Spam form submissions, automated account creation, or bypassing comment moderation systems that rely on this CAPTCHA for protection.

🟢

If Mitigated

With proper network controls and monitoring, impact is limited to spam and nuisance attacks rather than critical system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves spoofing authentication mechanisms, making it relatively easy to exploit once the method is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.79 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/google-captcha/vulnerability/wordpress-recaptcha-by-bestwebsoft-plugin-1-78-captcha-bypass-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'reCAPTCHA by BestWebSoft'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.79+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the Google Captcha plugin until patched

wp plugin deactivate google-captcha

Implement alternative CAPTCHA

all

Replace with a different CAPTCHA solution while waiting for patch

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CAPTCHA bypass attempts
  • Enable additional authentication factors on forms protected by this CAPTCHA

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'reCAPTCHA by BestWebSoft' version number

Check Version:

wp plugin get google-captcha --field=version

Verify Fix Applied:

Verify plugin version is 1.79 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of form submissions without CAPTCHA validation
  • Failed CAPTCHA verification logs followed by successful submissions

Network Indicators:

  • Automated form submissions bypassing CAPTCHA
  • Patterns of requests to CAPTCHA-protected endpoints without proper validation

SIEM Query:

source="wordpress" AND (event="form_submission" OR event="login_attempt") AND NOT captcha_validated="true" | stats count by src_ip

🔗 References

📤 Share & Export