### [CVE-2016-8600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8600) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later. ### POC #### Reference - http://seclists.org/fulldisclosure/2016/Oct/63 - https://security.elarlang.eu/cve-2016-8600-dotcms-captcha-bypass-by-reusing-valid-code.html #### Github No PoCs found on GitHub currently.