Lucene search

K
cveWordfenceCVE-2023-6963
HistoryFeb 05, 2024 - 10:15 p.m.

CVE-2023-6963

2024-02-0522:15:57
CWE-863
Wordfence
web.nvd.nist.gov
24
cve-2023-6963
getwid
gutenberg blocks
wordpress
captcha bypass
contact form
nvd

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

20.5%

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting ‘g-recaptcha-response’ from the ‘data’ array.

Affected configurations

Nvd
Vulners
Node
motopressgetwid_-_gutenberg_blocksRange<2.0.5wordpress
VendorProductVersionCPE
motopressgetwid_-_gutenberg_blocks*cpe:2.3:a:motopress:getwid_-_gutenberg_blocks:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "jetmonsters",
    "product": "Getwid – Gutenberg Blocks",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.0.4",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

20.5%