Description
Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack recaptcha-jetpack allows Cross Site Request Forgery.This issue affects reCAPTCHA Jetpack: from n/a through <= 0.2.2.
Published: 2025-04-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a CSRF flaw in the WordPress reCAPTCHA Jetpack plugin that allows an attacker to execute unintended actions on the site while an authorized user is logged in. The flaw permits the submission of forged requests, which could modify plugin settings, submit spam, or otherwise alter site content or configuration. This weakness is rooted in improper request validation (CWE‑352) and primarily threatens the integrity of the site rather than confidentiality or availability.

Affected Systems

The affected product is the WordPress reCAPTCHA Jetpack plugin by bozdoz. Any installed version equal to or less than 0.2.2 is vulnerable. No specific CPE was provided, but all copies of the plugin in those versions are impacted.

Risk and Exploitability

The CVSS score of 4.3 reflects a low overall severity. The EPSS score is less than 1%, indicating a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The most likely attack scenario involves a maliciously crafted link or form that an authenticated user is persuaded to visit; this would trigger a fraudulent request on behalf of the user. Because the impact depends on the privileges of the user who is logged in, the overall risk is moderate to low unless the site employs the plugin with high‑privilege accounts.

Generated by OpenCVE AI on April 30, 2026 at 23:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the reCAPTCHA Jetpack plugin to the latest release, which eliminates the CSRF weakness (any version newer than 0.2.2).
  • If an upgrade cannot be performed immediately, disable or remove the plugin entirely to remove the vulnerable code path.
  • Maintain a routine update policy for WordPress core and all plugins, and monitor the vendor’s advisories for future fixes related to CSRF protections.

Generated by OpenCVE AI on April 30, 2026 at 23:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10615 Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack allows Cross Site Request Forgery. This issue affects reCAPTCHA Jetpack: from n/a through 0.2.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack allows Cross Site Request Forgery. This issue affects reCAPTCHA Jetpack: from n/a through 0.2.2. Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack recaptcha-jetpack allows Cross Site Request Forgery.This issue affects reCAPTCHA Jetpack: from n/a through <= 0.2.2.
Title WordPress reCAPTCHA Jetpack <= 0.2.2 - Cross Site Request Forgery (CSRF) Vulnerability WordPress reCAPTCHA Jetpack plugin <= 0.2.2 - Cross Site Request Forgery (CSRF) Vulnerability
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Wed, 09 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack allows Cross Site Request Forgery. This issue affects reCAPTCHA Jetpack: from n/a through 0.2.2.
Title WordPress reCAPTCHA Jetpack <= 0.2.2 - Cross Site Request Forgery (CSRF) Vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:23.099Z

Reserved: 2025-04-09T11:19:01.930Z

Link: CVE-2025-32494

cve-icon Vulnrichment

Updated: 2025-04-09T18:23:20.457Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:42.500

Modified: 2026-04-23T15:28:59.060

Link: CVE-2025-32494

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:00:05Z

Weaknesses