Conditional CAPTCHA Vulnerability (Medium) – CVE-2026-1369

Conditional CAPTCHA Vulnerability (Medium) – CVE-2026-1369

by | Feb 25, 2026 | Plugins

Attack Vectors

Conditional CAPTCHA (slug: wp-conditional-captcha) is affected by CVE-2026-1369, a Medium-severity open redirect vulnerability (CVSS 5.3; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

This issue is unauthenticated, meaning an attacker does not need a WordPress login to attempt exploitation. The most likely path is a phishing-style lure: an attacker shares a crafted link or embeds it in an email, ad, social post, or a compromised page. If a user clicks and performs the expected action, they can be redirected to an attacker-controlled site.

Because open redirects can make malicious links appear to originate from your legitimate domain, they are often used to increase trust and click-through rates in scams.

Security Weakness

The vulnerability exists due to insufficient validation of a redirect URL supplied via a parameter in Conditional CAPTCHA versions up to and including 4.0.0. In practice, this can allow a redirect destination to be influenced by an attacker rather than being restricted to safe, expected locations.

From a governance and risk perspective, the key concern is that the redirect can leverage your brand and domain reputation as a “trusted hop” to send users somewhere unsafe. Per the published advisory, there is no known patch available at this time, so mitigation decisions should be based on your organization’s risk tolerance and external exposure.

Technical or Business Impacts

Brand and customer trust risk: Customers or employees may believe they are following a legitimate link from your website, only to be forwarded to a malicious destination (credential phishing, fake payment portals, malware lures). Even without a direct data breach, this can create reputational damage and support burden.

Campaign performance and deliverability risk: Open redirects are commonly abused in phishing. If attackers use your domain as part of their redirect chain, it can contribute to domain reputation issues that affect marketing email deliverability and ad platform trust signals.

Compliance and incident response impact: If users report being redirected from your domain to a malicious site, your team may need to treat it as a security incident, increasing investigation time, legal/compliance review, and communications overhead—even if your systems were not otherwise compromised.

Recommended actions (given “no known patch”): Consider uninstalling Conditional CAPTCHA (versions ≤ 4.0.0) and replacing it with a supported alternative. If removal is not immediately possible, prioritize compensating controls such as tighter monitoring for unusual redirect patterns, reviewing inbound reports of suspicious links, and limiting exposure paths where possible (e.g., reducing publicly reachable entry points that trigger redirects).

Similar attacks (real-world examples): Open redirect weaknesses are frequently used in phishing campaigns because they make malicious URLs look more trustworthy. Examples include open-redirect abuse reported in major platforms such as Google TAG reporting on phishing techniques that leverage trusted services, and community documentation of open redirect risks and abuse patterns such as PortSwigger’s Open Redirection guidance, as well as OWASP’s broader discussion of redirect/forwarding risks in Unvalidated Redirects and Forwards.

Reference: CVE-2026-1369 and the advisory source at Wordfence Threat Intel.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers