The reCaptcha by WebDesignBy WordPress plugin before 2.0 does not sanitize or escape the Site Key setting before outputting it in a JavaScript string context via the grecaptcha_js() function. This allows administrators on multisite installations (who do not have the unfiltered_html capability) to inject arbitrary JavaScript that executes for all visitors to the WordPress login page.
History

Thu, 23 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description The reCaptcha by WebDesignBy WordPress plugin before 2.0 does not sanitize or escape the Site Key setting before outputting it in a JavaScript string context via the grecaptcha_js() function. This allows administrators on multisite installations (who do not have the unfiltered_html capability) to inject arbitrary JavaScript that executes for all visitors to the WordPress login page.
Title WP reCaptcha by WebDesignBy < 2.0 – Admin+ Stored XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2026-04-23T06:00:09.102Z

Updated: 2026-04-23T13:02:47.866Z

Reserved: 2026-03-20T14:28:42.326Z

Link: CVE-2026-4512

cve-icon Vulnrichment

Updated: 2026-04-23T13:02:39.520Z

cve-icon NVD

Status : Received

Published: 2026-04-23T07:16:41.933

Modified: 2026-04-23T13:16:13.147

Link: CVE-2026-4512

cve-icon Redhat

No data.