Логотип exploitDog
bind:CVE-2023-6963
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6963

Количество 2

Количество 2

nvd логотип

CVE-2023-6963

около 2 лет назад

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-h2p5-5xgm-h7m9

около 2 лет назад

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6963

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-h2p5-5xgm-h7m9

The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 2.0.4. This makes it possible for unauthenticated attackers to bypass the Captcha Verification of the Contact Form block by omitting 'g-recaptcha-response' from the 'data' array.

CVSS3: 5.3
0%
Низкий
около 2 лет назад

Уязвимостей на страницу