Language:
https://wordpress.org/plugins/contact-form-7/#changelog
http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/
https://www.zerodaylab.com/vulnerabilities/CVE-2014/CVE-2014-2265.html
Severity: Medium
ID: 76169
File Name: wordpress_contact_form_7_captcha_bypass.nasl
Version: 1.9
Type: remote
Family: CGI abuses
Published: 6/20/2014
Updated: 6/4/2024
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Low
Score: 2.7
Risk Factor: Medium
Base Score: 5
Temporal Score: 3.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE: cpe:/a:rocklobster:contact_form_7, cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 2/26/2014
Vulnerability Publication Date: 2/26/2014
CVE: CVE-2014-2265
BID: 66381