CVE-2026-34206

Captcha Protect is a Traefik middleware to add an anti-bot challenge to individual IPs in a subnet when traffic spikes are detected from that subnet. Prior to version 1.12.2, a reflected cross-site scripting (XSS) vulnerability exists in github.com/libops/captcha-protect. The challenge page accepted a client-supplied destination value and rendered it into HTML using Go's text/template. Because text/template does not perform contextual HTML escaping, an attacker could supply a crafted destination value that breaks out of the hidden input attribute and injects arbitrary script into the challenge page. This issue has been patched in version 1.12.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libops:captcha_protect:*:*:*:*:*:traefik:*:*

History

07 Apr 2026, 15:59

Type Values Removed Values Added
References () https://github.com/libops/captcha-protect/commit/eef6211ecd1147273be484d913b81c68c0bd8d3f - () https://github.com/libops/captcha-protect/commit/eef6211ecd1147273be484d913b81c68c0bd8d3f - Patch
References () https://github.com/libops/captcha-protect/releases/tag/v1.12.2 - () https://github.com/libops/captcha-protect/releases/tag/v1.12.2 - Product, Release Notes
References () https://github.com/libops/captcha-protect/security/advisories/GHSA-ph62-4j5g-2q4r - () https://github.com/libops/captcha-protect/security/advisories/GHSA-ph62-4j5g-2q4r - Mitigation, Patch, Vendor Advisory
First Time Libops captcha Protect
Libops
CPE cpe:2.3:a:libops:captcha_protect:*:*:*:*:*:traefik:*:*

31 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 20:16

Updated : 2026-04-07 15:59


NVD link : CVE-2026-34206

Mitre link : CVE-2026-34206

CVE.ORG link : CVE-2026-34206


JSON object : View

Products Affected

libops

  • captcha_protect
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')