Cyber Posture

CVE-2025-23620

High

Published: 16 January 2025

Published
16 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
EPSS Score 0.0005 14.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in trof Captchelfie – Captcha by Selfie captchelfie-captcha-by-selfie allows Reflected XSS.This issue affects Captchelfie – Captcha by Selfie: from n/a through <= 1.0.7.

Security Summary

CVE-2025-23620 is an improper neutralization of input during web page generation vulnerability, enabling reflected cross-site scripting (XSS) as classified under CWE-79. It affects the WordPress plugin Captchelfie – Captcha by Selfie (captchelfie-captcha-by-selfie) in all versions from n/a through 1.0.7 inclusive. The vulnerability carries a CVSS v3.1 base score of 7.1, with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L, indicating high severity due to network accessibility, low complexity, no required privileges, user interaction, and changed scope.

Remote attackers require no privileges to exploit this issue by injecting malicious payloads into inputs that are reflected unsanitized on the web page. Victims must interact, typically by visiting a crafted URL, triggering arbitrary JavaScript execution in their browser context. This allows limited impacts: low confidentiality (e.g., potential session data exposure), integrity (e.g., minor page manipulation), and availability (e.g., brief denial via scripts), with scope expansion possibly affecting site users or resources.

Patchstack provides advisory details on this WordPress plugin vulnerability at https://patchstack.com/database/Wordpress/Plugin/captchelfie-captcha-by-selfie/vulnerability/wordpress-captchelfie-captcha-by-selfie-plugin-1-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve, which security practitioners should review for recommended mitigations such as plugin updates or input validation workarounds.

Details

CWE(s)
CWE-79

References