GHSA-8mgq-6r2q-82w9: Captcha Bypass in strapi-plugin-ezforms
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
8/30/2022
Updated
1/12/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| strapi-plugin-ezforms | npm | < 0.1.0 | 0.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing return statements in error handling after CAPTCHA validation failures. In the pre-patch version, after checking if verification.valid was false, the controller would log the error but continue processing notifications and database storage. The critical code flow continued even when CAPTCHA validation failed because the error responses (ctx.internalServerError/ctx.badRequest) weren't followed by return statements, allowing attackers to bypass CAPTCHA requirements. The patch added return statements to these error conditions, which properly terminates the request handling process() when CAPTCHA validation fails.