The Very Simple Contact Form WordPress plugin before 11.6 exposes the solution to the captcha in the rendered contact form, both as hidden input fields and as plain text in the page, making it very easy for bots to bypass the captcha check, rendering the page a likely target for spam bots.
The product uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/a5c97809-2ffc-4efb-8c80-1b734361cd06 | third party advisory exploit |