CVE-2023-6042: CWE-287 Improper Authentication in Unknown Getwid
Any unauthenticated user may send e-mail from the site with any title or content to the admin
AI Analysis
Technical Summary
CVE-2023-6042 is a high-severity vulnerability classified under CWE-287 (Improper Authentication) affecting the Getwid product. The vulnerability allows any unauthenticated user to send emails from the affected site to the administrator with arbitrary titles and content. This means that the application does not properly verify the identity or authorization of users before allowing the email-sending functionality to be used. The CVSS 3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:H) as the attacker can manipulate the content of emails sent to the admin, but confidentiality and availability are not directly affected. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No patches or known exploits in the wild have been reported as of the publication date (January 8, 2024). The vulnerability likely arises from a missing or flawed authentication check in the email sending functionality of Getwid, which is a WordPress plugin known for providing blocks and enhancements for the Gutenberg editor. Attackers exploiting this vulnerability could send phishing or spam emails appearing to originate from the site, potentially leading to social engineering attacks or administrative confusion.
Potential Impact
For European organizations using the Getwid plugin, this vulnerability poses a significant risk to the integrity of internal communications and administrative processes. Attackers could exploit this flaw to send deceptive emails to site administrators, potentially leading to phishing attacks, unauthorized actions based on manipulated email content, or reputational damage if such emails are perceived as legitimate. Although the vulnerability does not directly compromise confidentiality or availability, the ability to impersonate the site in communications can facilitate further attacks, including social engineering or spear-phishing campaigns targeting European entities. Organizations relying on WordPress sites with Getwid blocks, especially those with critical administrative workflows tied to email notifications, may experience operational disruptions or security incidents stemming from this vulnerability.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include disabling or restricting the email-sending functionality of the Getwid plugin until a patch is released. Administrators should audit and monitor outgoing emails for suspicious or unauthorized content. Implementing web application firewalls (WAF) with rules to detect and block anomalous email-sending requests can reduce exploitation risk. Additionally, organizations should enforce strict access controls on WordPress admin areas and consider multi-factor authentication to limit the impact of any phishing attempts resulting from this vulnerability. Regularly updating WordPress and all plugins, including Getwid, once patches become available is critical. Finally, educating administrators about this vulnerability and potential phishing tactics can reduce the likelihood of successful social engineering attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6042: CWE-287 Improper Authentication in Unknown Getwid
Description
Any unauthenticated user may send e-mail from the site with any title or content to the admin
AI-Powered Analysis
Technical Analysis
CVE-2023-6042 is a high-severity vulnerability classified under CWE-287 (Improper Authentication) affecting the Getwid product. The vulnerability allows any unauthenticated user to send emails from the affected site to the administrator with arbitrary titles and content. This means that the application does not properly verify the identity or authorization of users before allowing the email-sending functionality to be used. The CVSS 3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:H) as the attacker can manipulate the content of emails sent to the admin, but confidentiality and availability are not directly affected. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No patches or known exploits in the wild have been reported as of the publication date (January 8, 2024). The vulnerability likely arises from a missing or flawed authentication check in the email sending functionality of Getwid, which is a WordPress plugin known for providing blocks and enhancements for the Gutenberg editor. Attackers exploiting this vulnerability could send phishing or spam emails appearing to originate from the site, potentially leading to social engineering attacks or administrative confusion.
Potential Impact
For European organizations using the Getwid plugin, this vulnerability poses a significant risk to the integrity of internal communications and administrative processes. Attackers could exploit this flaw to send deceptive emails to site administrators, potentially leading to phishing attacks, unauthorized actions based on manipulated email content, or reputational damage if such emails are perceived as legitimate. Although the vulnerability does not directly compromise confidentiality or availability, the ability to impersonate the site in communications can facilitate further attacks, including social engineering or spear-phishing campaigns targeting European entities. Organizations relying on WordPress sites with Getwid blocks, especially those with critical administrative workflows tied to email notifications, may experience operational disruptions or security incidents stemming from this vulnerability.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include disabling or restricting the email-sending functionality of the Getwid plugin until a patch is released. Administrators should audit and monitor outgoing emails for suspicious or unauthorized content. Implementing web application firewalls (WAF) with rules to detect and block anomalous email-sending requests can reduce exploitation risk. Additionally, organizations should enforce strict access controls on WordPress admin areas and consider multi-factor authentication to limit the impact of any phishing attempts resulting from this vulnerability. Regularly updating WordPress and all plugins, including Getwid, once patches become available is critical. Finally, educating administrators about this vulnerability and potential phishing tactics can reduce the likelihood of successful social engineering attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-11-08T20:57:10.685Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3d9
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 2:12:36 AM
Last updated: 10/16/2025, 8:08:53 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0400: CWE-94 Improper Control of Generation of Code ('Code Injection') in Hitachi Energy MACH SCM
HighCVE-2025-55090: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumCVE-2025-62585: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownCVE-2025-62584: CWE-346 Origin Validation Error in NAVER NAVER Whale browser
UnknownCVE-2025-62583: CWE-358 Improperly Implemented Security Check for Standard in NAVER NAVER Whale browser
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.