CVE-2023-6963
EUVD-2023-5915905.02.2024, 22:15
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| motopress | getwid | 𝑥 < 2.0.5 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-804 - Guessable CAPTCHAThe software uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
References