Skip to main content

CVE-2022-2913: CWE-639 Authorization Bypass Through User-Controlled Key in Unknown Login No Captcha reCAPTCHA

Medium
VulnerabilityCVE-2022-2913cvecve-2022-2913cwe-639
Published: Fri Sep 16 2022 (09/16/2022, 08:40:39 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: Login No Captcha reCAPTCHA

Description

The Login No Captcha reCAPTCHA WordPress plugin before 1.7 doesn't check the proper IP address allowing attackers to spoof IP addresses on the allow list and bypass the need for captcha on the login screen.

AI-Powered Analysis

AILast updated: 07/04/2025, 10:40:11 UTC

Technical Analysis

CVE-2022-2913 is a medium-severity vulnerability affecting the WordPress plugin 'Login No Captcha reCAPTCHA' versions prior to 1.7. The vulnerability arises from improper validation of the IP address used in the plugin's allow list feature. Specifically, the plugin fails to correctly verify the source IP address of login requests, allowing an attacker to spoof an IP address that is on the allow list. This spoofing enables the attacker to bypass the CAPTCHA challenge on the login screen, which is intended to prevent automated login attempts and brute-force attacks. The underlying weakness is categorized under CWE-639, 'Authorization Bypass Through User-Controlled Key,' indicating that the authorization logic relies on a user-controllable input (the IP address) that can be manipulated to bypass security controls. The vulnerability does not require authentication but does require user interaction in the form of attempting a login. Exploitation is network-based and relatively straightforward given the low attack complexity. The impact is limited to integrity, as attackers can bypass CAPTCHA protections but do not gain direct access or cause confidentiality or availability loss by this vulnerability alone. No known exploits have been reported in the wild, and no official patches are linked, suggesting that mitigation may require manual updates or configuration changes. The CVSS 3.1 base score is 4.3, reflecting a medium severity level due to the limited impact scope and the need for user interaction.

Potential Impact

For European organizations using the Login No Captcha reCAPTCHA WordPress plugin, this vulnerability could facilitate automated or scripted login attempts by bypassing CAPTCHA protections. This increases the risk of brute-force attacks against user accounts, potentially leading to unauthorized access if weak passwords are used. While the vulnerability itself does not directly expose sensitive data or cause service disruption, it lowers the barrier for attackers to attempt credential stuffing or password guessing attacks. Organizations with public-facing WordPress sites that rely on this plugin for login security are at risk of increased attack surface. This is particularly concerning for sectors with sensitive user data or regulatory compliance requirements such as GDPR, where unauthorized access could lead to data breaches and legal consequences. The vulnerability may also be leveraged as a stepping stone in multi-stage attacks targeting European businesses, especially those with high-value accounts or administrative privileges protected by this plugin.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the Login No Captcha reCAPTCHA plugin and identify the version in use. If running a version prior to 1.7, they should upgrade to version 1.7 or later where the vulnerability is addressed. In the absence of an official patch, organizations can mitigate risk by disabling the allow list feature or restricting login attempts through alternative means such as web application firewalls (WAFs) that enforce IP reputation and rate limiting. Additionally, implementing multi-factor authentication (MFA) on WordPress logins can reduce the risk of unauthorized access even if CAPTCHA is bypassed. Monitoring login attempts for unusual patterns and enabling alerting on repeated failed logins can help detect exploitation attempts. Network-level controls should be applied to prevent IP spoofing where possible, such as ingress filtering on organizational networks. Finally, organizations should ensure that strong password policies are enforced to reduce the effectiveness of brute-force attacks facilitated by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-08-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f37c9182aa0cae28696c1

Added to database: 6/3/2025, 5:58:33 PM

Last enriched: 7/4/2025, 10:40:11 AM

Last updated: 8/15/2025, 7:11:00 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats