First published: Tue Mar 03 2015(Updated: )
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
BestWebSoft WordPress CAPTCHA | <=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9283 is classified as a high severity vulnerability due to its potential to allow unauthorized administrative access.
To fix CVE-2014-9283, you should update the BestWebSoft Captcha plugin to version 4.0.7 or later.
CVE-2014-9283 exploits a weakness in the CAPTCHA protection mechanism allowing remote attackers to bypass it.
Any WordPress sites using versions of the BestWebSoft Captcha plugin prior to 4.0.7 are at risk from CVE-2014-9283.
Currently, the recommended workaround for CVE-2014-9283 is to disable the affected plugin until an update can be applied.