Blue Captcha Security & Risk Analysis

wordpress.org/plugins/blue-captcha

Blue Captcha is a powerful and highly customized WordPress plugin that effectively protects your WP blogs from spammers and unwanted persons.

500 active installs v2.0.1 PHP 7.0+ WP 4.9+ Updated Feb 8, 2026
captchaprotectionrecaptchasafetysecurity
99
A · Safe
CVEs total1
Unpatched0
Last CVEMar 24, 2025
Safety Verdict

Is Blue Captcha Safe to Use in 2026?

Generally Safe

Score 99/100

Blue Captcha has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Mar 24, 2025Updated 1mo ago
Risk Assessment

The "blue-captcha" v2.0.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and properly escaping nearly all output. The absence of file operations and external HTTP requests also reduces its attack surface. Furthermore, there are no reported unpatched vulnerabilities at this time, and the plugin does not appear to bundle external libraries, which can often become outdated and introduce vulnerabilities.

However, several critical concerns are highlighted by the static analysis. The presence of 12 instances of the `unserialize` function is a significant risk, as unserializing untrusted data can lead to Remote Code Execution vulnerabilities. The taint analysis revealing 8 flows with unsanitized paths, including 5 of high severity, further amplifies this concern, suggesting potential injection vulnerabilities that could be exploited if data is not properly validated and escaped before being processed by these dangerous functions. The complete lack of nonce checks and capability checks on any identified entry points (though none were found) is a potential weakness that could be exploited if new entry points are introduced or if the plugin's intended functionality requires such checks. The vulnerability history, while showing no currently unpatched issues, indicates a past medium-severity vulnerability, specifically Cross-site Scripting, suggesting that the plugin has had exploitable flaws in the past.

In conclusion, while "blue-captcha" v2.0.1 shows promise with its database and output handling, the extensive use of `unserialize` and high-severity unsanitized taint flows represent a substantial security risk. The absence of authentication checks on its limited attack surface is also a point of concern. Addressing the risks associated with `unserialize` and ensuring all data flows are properly sanitized and validated is paramount for improving the plugin's security. Developers should also consider implementing nonce and capability checks as a defensive measure, even with a seemingly limited attack surface.

Key Concerns

  • Use of unserialize function
  • High severity unsanitized taint flows
  • Missing nonce checks
  • Missing capability checks
  • Past medium vulnerability (XSS)
Vulnerabilities
1

Blue Captcha Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-28880medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Blue Captcha <= 1.7.4 - Reflected Cross-Site Scripting

Mar 24, 2025 Patched in 2.0.0 (45d)
Code Analysis
Analyzed Mar 16, 2026

Blue Captcha Code Analysis

Dangerous Functions
12
Raw SQL Queries
0
54 prepared
Unescaped Output
16
1207 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$sss = @unserialize ($blcap_setser);blimage.php:78
unserialize$settings_arr = @unserialize ($settings);bluecaptcha.php:89
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:535
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:686
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:920
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:1069
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:1294
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:1443
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:1666
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:1957
unserialize$sss = @unserialize ($blcap_setser);bluecaptcha.php:2005
unserialize$blcap_set = @unserialize ($blcap_setser);blueoptions.php:656

SQL Query Safety

100% prepared54 total queries

Output Escaping

99% escaped1223 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

8 flows8 with unsanitized paths
<bluehos> (bluehos.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Blue Captcha Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_menubluecaptcha.php:2375
actioninitbluecaptcha.php:2377
actionplugins_loadedbluecaptcha.php:2378
actionlogin_formbluecaptcha.php:2380
actionwp_authenticatebluecaptcha.php:2381
actionregister_formbluecaptcha.php:2383
filterregistration_errorsbluecaptcha.php:2384
actionlostpassword_formbluecaptcha.php:2386
actionlostpassword_postbluecaptcha.php:2387
actioncomment_form_after_fieldsbluecaptcha.php:2391
actioncomment_form_logged_in_afterbluecaptcha.php:2392
actioncomment_formbluecaptcha.php:2394
filterpreprocess_commentbluecaptcha.php:2396
Maintenance & Trust

Blue Captcha Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 8, 2026
PHP min version7.0
Downloads37K

Community Trust

Rating94/100
Number of ratings15
Active installs500
Developer Profile

Blue Captcha Developer Profile

jotis

1 plugin · 500 total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
45 days
View full developer profile
Detection Fingerprints

How We Detect Blue Captcha

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blue-captcha/css/blcap_admin.css/wp-content/plugins/blue-captcha/css/blcap_public.css/wp-content/plugins/blue-captcha/js/blcap_admin.js/wp-content/plugins/blue-captcha/js/blcap_public.js
Script Paths
/wp-content/plugins/blue-captcha/js/blcap_admin.js/wp-content/plugins/blue-captcha/js/blcap_public.js
Version Parameters
blue-captcha/css/blcap_admin.css?ver=blue-captcha/css/blcap_public.css?ver=blue-captcha/js/blcap_admin.js?ver=blue-captcha/js/blcap_public.js?ver=

HTML / DOM Fingerprints

CSS Classes
blcap_adminblcap_public
JS Globals
blcap_admin_optionsblcap_public_options
FAQ

Frequently Asked Questions about Blue Captcha