BT Captcha Security & Risk Analysis

wordpress.org/plugins/bt-captcha

BT Captcha - simple, Bilingual, Flexible, Protect Your WP Blog Against Comment Spams

10 active installs v1.0 PHP + WP 2.8.4+ Updated Sep 21, 2011
botcaptchacommentsrobotspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BT Captcha Safe to Use in 2026?

Generally Safe

Score 85/100

BT Captcha has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "bt-captcha" v1.0 plugin exhibits a mixed security posture. On one hand, the absence of known vulnerabilities and CVEs in its history is a positive indicator, suggesting a well-maintained or less-targeted plugin. The static analysis also shows a lack of dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests, which are all strong security practices. However, significant concerns arise from the output escaping. With 100% of outputs not properly escaped, this presents a high risk of cross-site scripting (XSS) vulnerabilities. Although the taint analysis did not flag critical or high severity issues, the presence of unsanitized flows indicates potential weaknesses that could be exploited if user input is not handled carefully. The complete lack of nonce checks and capability checks, combined with zero AJAX handlers and REST API routes, is unusual for a plugin that likely interacts with user input. While this reduces the attack surface, it also means there's no granular access control or protection against certain types of attacks if any entry points were to be discovered or introduced in future versions. The plugin's strengths lie in its clean history and avoidance of common dangerous code patterns, but the unescaped output is a glaring weakness that requires immediate attention.

Key Concerns

  • All outputs are unescaped, leading to XSS risk
  • No nonce checks implemented
  • No capability checks implemented
  • Taint analysis found unsanitized flows
Vulnerabilities
None known

BT Captcha Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

BT Captcha Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

BT Captcha Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped7 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ant_comment_form (BTCaptcha.php:45)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

BT Captcha Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterplugin_action_linksBTCaptcha.php:11
actioncomment_formBTCaptcha.php:37
actioncomment_postBTCaptcha.php:38
Maintenance & Trust

BT Captcha Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 21, 2011
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

BT Captcha Developer Profile

Payadl

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BT Captcha

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/bt-captcha/bt-captcha.js

HTML / DOM Fingerprints

CSS Classes
textfield
Data Attributes
id="bt-captcha"
JS Globals
window.urlinput
FAQ

Frequently Asked Questions about BT Captcha