First published: Fri Mar 14 2014(Updated: )
Rock Lobster Contact Form 7 before 3.7.2 allows remote attackers to bypass the CAPTCHA protection mechanism and submit arbitrary form data by omitting the _wpcf7_captcha_challenge_captcha-719 parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rocklobster Contact Form 7 | <=3.7.1 | |
Rocklobster Contact Form 7 | =3.6 | |
Rocklobster Contact Form 7 | =3.7 | |
WordPress | ||
All of | ||
Any of | ||
Rocklobster Contact Form 7 | <=3.7.1 | |
Rocklobster Contact Form 7 | =3.6 | |
Rocklobster Contact Form 7 | =3.7 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2265 has a medium severity rating, highlighting a potential risk to data integrity.
To fix CVE-2014-2265, update Rock Lobster Contact Form 7 to version 3.7.2 or later to restore CAPTCHA functionality.
CVE-2014-2265 exploits the ability to bypass CAPTCHA protection in older versions of Rock Lobster Contact Form 7.
Users of Rock Lobster Contact Form 7 versions prior to 3.7.2 are affected by CVE-2014-2265.
Yes, CVE-2014-2265 can allow attackers to submit arbitrary form data, leading to potential spam submissions.