CVE-2023-6042: CWE-287 Improper Authentication in Unknown Getwid
Any unauthenticated user may send e-mail from the site with any title or content to the admin
AI Analysis
Technical Summary
CVE-2023-6042 is a high-severity vulnerability classified under CWE-287 (Improper Authentication) affecting the Getwid product. The vulnerability allows any unauthenticated user to send emails from the affected site to the administrator with arbitrary titles and content. This means that the application does not properly verify the identity or authorization of users before allowing the email-sending functionality to be used. The CVSS 3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:H) as the attacker can manipulate the content of emails sent to the admin, but confidentiality and availability are not directly affected. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No patches or known exploits in the wild have been reported as of the publication date (January 8, 2024). The vulnerability likely arises from a missing or flawed authentication check in the email sending functionality of Getwid, which is a WordPress plugin known for providing blocks and enhancements for the Gutenberg editor. Attackers exploiting this vulnerability could send phishing or spam emails appearing to originate from the site, potentially leading to social engineering attacks or administrative confusion.
Potential Impact
For European organizations using the Getwid plugin, this vulnerability poses a significant risk to the integrity of internal communications and administrative processes. Attackers could exploit this flaw to send deceptive emails to site administrators, potentially leading to phishing attacks, unauthorized actions based on manipulated email content, or reputational damage if such emails are perceived as legitimate. Although the vulnerability does not directly compromise confidentiality or availability, the ability to impersonate the site in communications can facilitate further attacks, including social engineering or spear-phishing campaigns targeting European entities. Organizations relying on WordPress sites with Getwid blocks, especially those with critical administrative workflows tied to email notifications, may experience operational disruptions or security incidents stemming from this vulnerability.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include disabling or restricting the email-sending functionality of the Getwid plugin until a patch is released. Administrators should audit and monitor outgoing emails for suspicious or unauthorized content. Implementing web application firewalls (WAF) with rules to detect and block anomalous email-sending requests can reduce exploitation risk. Additionally, organizations should enforce strict access controls on WordPress admin areas and consider multi-factor authentication to limit the impact of any phishing attempts resulting from this vulnerability. Regularly updating WordPress and all plugins, including Getwid, once patches become available is critical. Finally, educating administrators about this vulnerability and potential phishing tactics can reduce the likelihood of successful social engineering attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6042: CWE-287 Improper Authentication in Unknown Getwid
Description
Any unauthenticated user may send e-mail from the site with any title or content to the admin
AI-Powered Analysis
Technical Analysis
CVE-2023-6042 is a high-severity vulnerability classified under CWE-287 (Improper Authentication) affecting the Getwid product. The vulnerability allows any unauthenticated user to send emails from the affected site to the administrator with arbitrary titles and content. This means that the application does not properly verify the identity or authorization of users before allowing the email-sending functionality to be used. The CVSS 3.1 base score of 7.5 reflects a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to integrity (I:H) as the attacker can manipulate the content of emails sent to the admin, but confidentiality and availability are not directly affected. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No patches or known exploits in the wild have been reported as of the publication date (January 8, 2024). The vulnerability likely arises from a missing or flawed authentication check in the email sending functionality of Getwid, which is a WordPress plugin known for providing blocks and enhancements for the Gutenberg editor. Attackers exploiting this vulnerability could send phishing or spam emails appearing to originate from the site, potentially leading to social engineering attacks or administrative confusion.
Potential Impact
For European organizations using the Getwid plugin, this vulnerability poses a significant risk to the integrity of internal communications and administrative processes. Attackers could exploit this flaw to send deceptive emails to site administrators, potentially leading to phishing attacks, unauthorized actions based on manipulated email content, or reputational damage if such emails are perceived as legitimate. Although the vulnerability does not directly compromise confidentiality or availability, the ability to impersonate the site in communications can facilitate further attacks, including social engineering or spear-phishing campaigns targeting European entities. Organizations relying on WordPress sites with Getwid blocks, especially those with critical administrative workflows tied to email notifications, may experience operational disruptions or security incidents stemming from this vulnerability.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include disabling or restricting the email-sending functionality of the Getwid plugin until a patch is released. Administrators should audit and monitor outgoing emails for suspicious or unauthorized content. Implementing web application firewalls (WAF) with rules to detect and block anomalous email-sending requests can reduce exploitation risk. Additionally, organizations should enforce strict access controls on WordPress admin areas and consider multi-factor authentication to limit the impact of any phishing attempts resulting from this vulnerability. Regularly updating WordPress and all plugins, including Getwid, once patches become available is critical. Finally, educating administrators about this vulnerability and potential phishing tactics can reduce the likelihood of successful social engineering attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-11-08T20:57:10.685Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff3d9
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 2:12:36 AM
Last updated: 7/31/2025, 6:47:05 AM
Views: 12
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.