Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webdesignby
Webdesignby recaptcha By Webdesignby Wordpress Wordpress wordpress |
|
| Vendors & Products |
Webdesignby
Webdesignby recaptcha By Webdesignby Wordpress Wordpress wordpress |
Thu, 23 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 |
Thu, 23 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 23 Apr 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The reCaptcha by WebDesignBy WordPress plugin before 2.0 does not sanitize or escape the Site Key setting before outputting it in a JavaScript string context via the grecaptcha_js() function. This allows administrators on multisite installations (who do not have the unfiltered_html capability) to inject arbitrary JavaScript that executes for all visitors to the WordPress login page. | |
| Title | WP reCaptcha by WebDesignBy < 2.0 – Admin+ Stored XSS | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-04-23T15:50:03.992Z
Reserved: 2026-03-20T14:28:42.326Z
Link: CVE-2026-4512
Updated: 2026-04-23T13:02:39.520Z
Status : Deferred
Published: 2026-04-23T07:16:41.933
Modified: 2026-04-23T18:16:30.190
Link: CVE-2026-4512
No data.
OpenCVE Enrichment
Updated: 2026-04-28T15:00:14Z