The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Motopress getwid
|
|
CPEs | cpe:2.3:a:motopress:getwid:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Motopress getwid - Gutenberg Blocks
|
Motopress getwid
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-02-05T21:22:02.318Z
Updated: 2024-08-02T08:50:06.720Z
Reserved: 2023-12-19T20:14:55.515Z
Link: CVE-2023-6963
Vulnrichment
Updated: 2024-08-02T08:50:06.720Z
NVD
Status : Modified
Published: 2024-02-05T22:15:57.930
Modified: 2024-11-25T16:47:33.943
Link: CVE-2023-6963
Redhat
No data.