The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/3022982 | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/d317f2c7-06f3-4875-9f9b-eb7f450aa2f4?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-05 22:15
Updated : 2024-02-14 17:05
NVD link : CVE-2023-6963
Mitre link : CVE-2023-6963
CVE.ORG link : CVE-2023-6963
JSON object : View
Products Affected
motopress
- getwid_-_gutenberg_blocks
CWE
CWE-863
Incorrect Authorization