CVE-2026-1369

4.3 MEDIUM

📋 TL;DR

The Conditional CAPTCHA WordPress plugin through version 4.0.0 contains an open redirect vulnerability that allows attackers to redirect users to malicious websites. This affects WordPress sites using vulnerable versions of the plugin, potentially compromising user trust and enabling phishing attacks.

💻 Affected Systems

Products:
  • Conditional CAPTCHA WordPress Plugin
Versions: through 4.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with the vulnerable plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or install malware, leading to account compromise and data breaches.

🟠

Likely Case

Attackers use the redirect for phishing campaigns, tricking users into visiting malicious sites that appear legitimate.

🟢

If Mitigated

With proper user education and browser security features, users might recognize suspicious redirects, reducing successful attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns and require minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.1 or later

Vendor Advisory: https://wpscan.com/vulnerability/5a275725-85f2-4463-880b-9473dbdfa8e0/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Conditional CAPTCHA plugin. 4. Click 'Update Now' if available. 5. If no update appears, manually download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the Conditional CAPTCHA plugin until patched.

wp plugin deactivate conditional-captcha

🧯 If You Can't Patch

  • Implement WAF rules to block redirects with external domains in the vulnerable parameter.
  • Use browser security extensions that warn about open redirects.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Conditional CAPTCHA version. If version is 4.0.0 or earlier, it's vulnerable.

Check Version:

wp plugin get conditional-captcha --field=version

Verify Fix Applied:

Verify plugin version is 4.0.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirects in web server logs with external domains in redirect parameters.
  • Multiple 302 redirect responses to unfamiliar domains.

Network Indicators:

  • HTTP 302 redirects to external domains from WordPress pages using the Conditional CAPTCHA plugin.

SIEM Query:

source="web_server_logs" AND (status=302 OR status=301) AND uri CONTAINS "conditional-captcha" AND referrer_domain != current_domain

🔗 References

📤 Share & Export