Description
If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70129.pdf
Various Sources
https://youtu.be/dD2olE4yMqY
Scores
CVSS v3
5.3
EPSS
0.0005
EPSS Percentile
15.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-804
Status
published
Products (1)
pluxml/pluxml
< 5.8.22
Published
Mar 10, 2026
Tracked Since
Mar 11, 2026