CVE-2025-24628
📋 TL;DR
This vulnerability allows attackers to bypass CAPTCHA verification in the BestWebSoft Google Captcha WordPress plugin, enabling identity spoofing and potentially unauthorized access to protected forms or login systems. It affects all WordPress sites using this plugin from any version up to 1.78.
💻 Affected Systems
- BestWebSoft Google Captcha (reCAPTCHA by BestWebSoft) WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could submit spam through contact forms, brute-force login pages without rate limiting, or bypass authentication on forms protected by this CAPTCHA, potentially leading to account takeover or data exfiltration.
Likely Case
Spam form submissions, automated account creation, or bypassing comment moderation systems that rely on this CAPTCHA for protection.
If Mitigated
With proper network controls and monitoring, impact is limited to spam and nuisance attacks rather than critical system compromise.
🎯 Exploit Status
The vulnerability involves spoofing authentication mechanisms, making it relatively easy to exploit once the method is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.79 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'reCAPTCHA by BestWebSoft'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.79+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable vulnerable plugin
allTemporarily disable the Google Captcha plugin until patched
wp plugin deactivate google-captcha
Implement alternative CAPTCHA
allReplace with a different CAPTCHA solution while waiting for patch
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block CAPTCHA bypass attempts
- Enable additional authentication factors on forms protected by this CAPTCHA
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for 'reCAPTCHA by BestWebSoft' version number
Check Version:
wp plugin get google-captcha --field=version
Verify Fix Applied:
Verify plugin version is 1.79 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unusual volume of form submissions without CAPTCHA validation
- Failed CAPTCHA verification logs followed by successful submissions
Network Indicators:
- Automated form submissions bypassing CAPTCHA
- Patterns of requests to CAPTCHA-protected endpoints without proper validation
SIEM Query:
source="wordpress" AND (event="form_submission" OR event="login_attempt") AND NOT captcha_validated="true" | stats count by src_ip