Like everyone else, we run into spam issues on our WordPress site. Every month we get a significant amount of traffic, and we are faced with some strange problem. We use the Really Simple Captcha plugin with contact format 7, and it works great for the most part (it reduces almost all spam), except when every day still passes. The form we are in is the departure contact form that appears when you hover over the link in the header. This is mainly on every page of the site.
In the email we receive from the view, we have the URL that the message displays below. The only thing that combines all successful spam messages is that "? Action = register" is added to the URLs they send. If I go to the link that it sends and adds that at the end of the URL, the form and CAPTCHA are still working (i.e. if I find CAPTCHA wrong, it blocks me). So it's weird.
I know that "? Action = register" is usually added to wp-login.php so that users can register on the site. I also know that there is a plugin ( https://wordpress.org/plugins/custom-registration-link/ ) that will fix it to a certain extent, but the plugin is very outdated and also just change the registration link (not necessary to prevent spam).
We have registered on our website, since we manually enter users, if we need me to know a couple of patches that I can use to solve this problem (redirect people when $ _GET ['action'] is installed, for example), but he does not answer why this will happen. How could there be any vulnerability only with a GET variable?
source share