Description
The Gotcha | Gesture-based Captcha plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menu' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-03-22
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (XSS)
Action: Update plugin
AI Analysis

Impact

This vulnerability is a reflected cross‑site scripting flaw in the Gotcha │ Gesture‑based Captcha WordPress plugin. The flaw exists because the 'menu' parameter is not properly sanitized or escaped, allowing an attacker to inject arbitrary JavaScript that runs when a victim follows a crafted link. The weakness is a classic input validation issue, identified as CWE‑79, and permits unauthenticated exploitation without needing special permissions. When triggered, the injected script can steal session cookies, deface the page, or redirect the user, compromising confidentiality, integrity, and availability of the site.

Affected Systems

The issue affects all installations of the Gotcha │ Gesture‑based Captcha plugin published by Pienaro. Any WordPress site running version 1.0.0 or earlier is vulnerable; newer releases are not mentioned as affected by the vendor.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS score of less than 1% shows a very low but non‑zero probability of exploitation. The plugin is not listed in the CISA KEV catalog, which means there are no known active exploits reported. Because the vulnerability can be triggered by an unauthenticated user via a malicious link, the attack vector is most likely social engineering or phishing. An attacker does not need to log in, but relies on user interaction to execute the injected code.

Generated by OpenCVE AI on April 21, 2026 at 21:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Gotcha │ Gesture‑based Captcha to a version that removes the vulnerable 'menu' parameter handling (check the vendor changelog for a fix).
  • If an update is not immediately possible, disable or sanitize the 'menu' parameter in the plugin’s source code or through a custom filter to prevent reflected script injection.
  • Implement a strict Content Security Policy that blocks inline scripts and restricts script sources to trusted origins, reducing the impact if an attacker succeeds in injecting payloads.

Generated by OpenCVE AI on April 21, 2026 at 21:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7184 The Gotcha | Gesture-based Captcha plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menu' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Gotcha | Gesture-based Captcha plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menu' parameter in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Gotcha | Gesture-based Captcha <= 1.0.0 - Reflected Cross-Site Scripting via menu Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:59:42.385Z

Reserved: 2025-03-17T22:47:55.832Z

Link: CVE-2025-2482

cve-icon Vulnrichment

Updated: 2025-04-01T16:25:23.770Z

cve-icon NVD

Status : Deferred

Published: 2025-03-22T07:15:25.307

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2482

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses