Contact Form 7 Plugin for WordPress CAPTCHA Validation Bypass

medium Nessus Plugin ID 76169

Synopsis

The remote web server contains a PHP application that is affected by a CAPTCHA validation bypass vulnerability.

Description

The Contact Form 7 Plugin for WordPress installed on the remote host is affected by a CAPTCHA validation bypass vulnerability due to a failure to properly verify that the CAPTCHA field has been submitted.
This can allow an attacker to bypass the CAPTCHA and send spam or other types of data through the affected host.

Solution

Upgrade to version 3.7.2 or later.

See Also

https://wordpress.org/plugins/contact-form-7/#changelog

http://www.hedgehogsecurity.co.uk/2014/02/26/contactform7-vulnerability/

https://www.zerodaylab.com/vulnerabilities/CVE-2014/CVE-2014-2265.html

http://contactform7.com/2014/02/26/contact-form-7-372/

Plugin Details

Severity: Medium

ID: 76169

File Name: wordpress_contact_form_7_captcha_bypass.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 6/20/2014

Updated: 6/4/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:rocklobster:contact_form_7, cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 2/26/2014

Vulnerability Publication Date: 2/26/2014

Reference Information

CVE: CVE-2014-2265

BID: 66381