Status: A new version of WP-reCAPTCHA has been released
Gabriel Quadros has discovered a vulnerability in the WP-reCAPTCHA plugin for WordPress, which can be exploited by malicious people to conduct cross-site request forgery attacks. The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. disable the captcha verification for the registration form or conduct script insertion attacks by tricking an administrator into visiting a malicious web site while being logged-in to the application.
- Secunia ID: 43771
- Credit: Conviso IT Security
- Plugin statistics provided by WordPress.org. Updated within the last day or so.
- ¹ Status info requires plugin author's to fill in versioning info on the wordpress.org repository