Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-70129

Опубликовано: 10 мар. 2026
Источник: nvd
CVSS3: 5.3
EPSS Низкий

Описание

If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:*
Версия до 5.8.22 (включая)

EPSS

Процентиль: 11%
0.00037
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-804

Связанные уязвимости

CVSS3: 5.3
ubuntu
29 дней назад

If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available.

CVSS3: 5.3
debian
29 дней назад

If the anti spam-captcha functionality in PluXml versions 5.8.22 and e ...

CVSS3: 5.3
github
29 дней назад

If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available.

EPSS

Процентиль: 11%
0.00037
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-804