View online: https://www.drupal.org/sa-contrib-2020-019
Project: reCAPTCHA v3 [1] Date: 2020-May-13 Security risk: *Critical* 18∕25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Access bypass
Description: The reCaptcha v3 module enables you to protect your forms using the Google reCaptcha V3.
If the reCaptcha v3 challenge succeeds, all the other form validations are bypassed. This makes it possible for attackers to submit invalid or incomplete forms.
This vulnerability only affects forms that are protected by reCaptcha v3 and have server side validation steps (e.g required field or custom validation functions).
Solution: Install the latest version:
* If you use the reCAPTCHA v3 module for Drupal 8.x, upgrade to reCAPTCHA v3 8.x-1.2 [3]
Also see the reCAPTCHA v3 [4] project page.
Reported By: * arnaudvz [5] * Martijn Vermeulen [6]
Fixed By: * Denis V***** [7] * Majid Ali Khan [8]
Coordinated By: * Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/recaptcha_v3 [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/recaptcha_v3/releases/8.x-1.2 [4] https://www.drupal.org/project/recaptcha_v3 [5] https://www.drupal.org/user/3628871 [6] https://www.drupal.org/user/960720 [7] https://www.drupal.org/user/896504 [8] https://www.drupal.org/user/1271330 [9] https://www.drupal.org/user/36762