Description
WordPress Plugin Peter's Math Anti-Spam is prone to a security bypass vulnerability. This issue occurs when presenting a visitor with challenge data to determine if they are a legitimate user or an automaton. The challenge data is poorly obfuscated and can be interpreted by script code. Attackers can leverage this issue to bypass the security measures provided by the plugin via an automated script. This could aid in spam distribution and other attacks. WordPress Plugin Peter's Math Anti-Spam version 0.1.6 is vulnerable; other versions may also be affected.
Remediation
Disable the plugin
References
Related Vulnerabilities
Oracle Database Server Incorrect Calculation of Buffer Size Vulnerability (CVE-2004-1363)
Python Integer Overflow or Wraparound Vulnerability (CVE-2007-4965)
WordPress Plugin WP Ajax Recent Posts 'number' Parameter Cross-Site Scripting (1.0.1)
WordPress Incorrect Default Permissions Vulnerability (CVE-2011-1762)
CubeCart Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3724)