cve/2022/CVE-2022-2913.md

18 lines
800 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2913](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2913)
![](https://img.shields.io/static/v1?label=Product&message=Login%20No%20Captcha%20reCAPTCHA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.7%3C%201.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen)
### Description
The Login No Captcha reCAPTCHA WordPress plugin before 1.7 doesn't check the proper IP address allowing attackers to spoof IP addresses on the allow list and bypass the need for captcha on the login screen.
### POC
#### Reference
- https://wpscan.com/vulnerability/5231ac18-ea9a-4bb9-af9f-e3d95a3b54f1
#### Github
No PoCs found on GitHub currently.