Description
Guessable CAPTCHA vulnerability in jp-secure SiteGuard WP Plugin siteguard allows Functionality Bypass.This issue affects SiteGuard WP Plugin: from n/a through <= 1.7.9.
Published: 2026-03-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: CAPTCHA Bypass enabling unauthorized use of protected functions
Action: Patch
AI Analysis

Impact

This vulnerability arises from a guessable CAPTCHA implementation within the SiteGuard WP Plugin. An attacker can predict or brute‑force the CAPTCHA value to bypass the plugin’s verification step that protects forms and other features. Based on the description, it is inferred that the bypass could allow unauthorized submissions such as spam comments or malicious content, although the CVE does not explicitly claim it impacts authentication or login processes. The primary impact is functional bypass, granting the attacker the same level of access to the protected features as a legitimate user.

Affected Systems

The SiteGuard WP Plugin, published by jp-secure, is affected in all releases up to and including version 1.7.9. No more specific versioning information is provided by the CNA beyond the upper bound of 1.7.9.

Risk and Exploitability

The CVSS score of 5.3 places this issue in the moderate severity range, and the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. Based on the description, the likely attack vector is web-based: an attacker needs only to guess or compute the CAPTCHA value, which requires no authentication. Once bypassed, the attacker can use the plugin’s functional features, potentially enabling spam, unauthorized content submissions, or other indirect damage. The overall risk remains moderate, with exploitation considered rare given the low EPSS score.

Generated by OpenCVE AI on April 16, 2026 at 12:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SiteGuard WP Plugin to a release newer than 1.7.9.
  • If an immediate upgrade is not possible, temporarily disable or delete the plugin from the WordPress installation.
  • Ensure that any remaining forms or features protected by CAPTCHA have server-side CAPTCHA verification that cannot be guessed or brute-forced.

Generated by OpenCVE AI on April 16, 2026 at 12:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Jp-secure
Jp-secure siteguard Wp Plugin
Wordpress
Wordpress wordpress
Vendors & Products Jp-secure
Jp-secure siteguard Wp Plugin
Wordpress
Wordpress wordpress

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description Guessable CAPTCHA vulnerability in jp-secure SiteGuard WP Plugin siteguard allows Functionality Bypass.This issue affects SiteGuard WP Plugin: from n/a through <= 1.7.9.
Title WordPress SiteGuard WP Plugin plugin <= 1.7.9 - Captcha Bypass vulnerability
Weaknesses CWE-804
References

Subscriptions

Jp-secure Siteguard Wp Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:15:16.224Z

Reserved: 2026-02-19T09:52:22.262Z

Link: CVE-2026-27411

cve-icon Vulnrichment

Updated: 2026-03-09T14:57:24.583Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-05T06:16:29.093

Modified: 2026-03-09T16:16:20.533

Link: CVE-2026-27411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:45:35Z

Weaknesses