cvelist/2022/1xxx/CVE-2022-1801.json

76 lines
1.9 KiB
JSON
Raw Normal View History

2022-05-19 15:01:43 +00:00
{
2022-06-20 12:24:16 +02:00
"CVE_data_meta": {
"ID": "CVE-2022-1801",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Very Simple Contact Form < 11.6 - Captcha bypass"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Very Simple Contact Form",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "11.6",
"version_value": "11.6"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Very Simple Contact Form WordPress plugin before 11.6 exposes the solution to the captcha in the rendered contact form, both as hidden input fields and as plain text in the page, making it very easy for bots to bypass the captcha check, rendering the page a likely target for spam bots."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06",
"name": "https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-804 Guessable CAPTCHA",
"lang": "eng"
}
2022-05-19 15:01:43 +00:00
]
2022-06-20 12:24:16 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Sebastian Cruz Cardona"
2022-05-19 15:01:43 +00:00
}
2022-06-20 12:24:16 +02:00
],
"source": {
"discovery": "EXTERNAL"
}
}