If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam mechanism trivially and publish spam comments. The details of captcha challenge are exposed within document body of articles with comments & anti spam-captcha functionalities enabled, including "capcha-letter", "capcha-word" and "capcha-token" which can be used to construct a valid post request to publish a comment. As such, attackers can flood articles with automated spam comments, especially if there are no other web defenses available.
References
| Link | Resource |
|---|---|
| https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70129.pdf | Exploit Third Party Advisory |
| https://youtu.be/dD2olE4yMqY | Exploit |
Configurations
History
07 Apr 2026, 01:21
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pluxml pluxml
Pluxml |
|
| CPE | cpe:2.3:a:pluxml:pluxml:*:*:*:*:*:*:*:* | |
| References | () https://github.com/forest4x/vuln-research-public/blob/main/CVE-2025-70129.pdf - Exploit, Third Party Advisory | |
| References | () https://youtu.be/dD2olE4yMqY - Exploit |
11 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-804 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
11 Mar 2026, 13:53
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-10 20:16
Updated : 2026-04-07 01:21
NVD link : CVE-2025-70129
Mitre link : CVE-2025-70129
CVE.ORG link : CVE-2025-70129
JSON object : View
Products Affected
pluxml
- pluxml
CWE
CWE-804
Guessable CAPTCHA
