Lucene search

K
nvd[email protected]NVD:CVE-2023-6963
HistoryFeb 05, 2024 - 10:15 p.m.

CVE-2023-6963

2024-02-0522:15:57
CWE-863
web.nvd.nist.gov
1
cve-2023-6963
captcha bypass
contact form block
unauthenticated attackers
wordpress

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

20.5%

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting ‘g-recaptcha-response’ from the ‘data’ array.

Affected configurations

Nvd
Node
motopressgetwid_-_gutenberg_blocksRange<2.0.5wordpress
VendorProductVersionCPE
motopressgetwid_-_gutenberg_blocks*cpe:2.3:a:motopress:getwid_-_gutenberg_blocks:*:*:*:*:*:wordpress:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

20.5%