cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwpdiscuz wpdiscuz

Direction: ascending
Jun 07, 2024

Comments – wpDiscuz # CVE-2020-24186

CVE, Research URL

CVE-2020-24186

Date
Aug 24, 2020
Research Description
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Affected versions
Min -, max -.
Status
vulnerable

Comments – wpDiscuz # CVE-2022-43492

CVE, Research URL

CVE-2022-43492

Date
Nov 19, 2022
Research Description
Auth. (subscriber+) Insecure Direct Object References (IDOR) vulnerability in Comments – wpDiscuz plugin 7.4.2 on WordPress.
Affected versions
Min -, max -.
Status
vulnerable

Comments – wpDiscuz # CVE-2021-24737

CVE, Research URL

CVE-2021-24737

Date
Oct 11, 2021
Research Description
The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Affected versions
Min -, max -.
Status
vulnerable

Comments – wpDiscuz # CVE-2020-13640

CVE, Research URL

CVE-2020-13640

Date
Jun 18, 2020
Research Description
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
Affected versions
Min -, max -.
Status
vulnerable

Comments – wpDiscuz # CVE-2023-3998

CVE, Research URL

CVE-2023-3998

Date
Oct 20, 2023
Research Description
The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a post.
Affected versions
Min -, max -.
Status
vulnerable

Comments – wpDiscuz # CVE-2022-23984

CVE, Research URL

CVE-2022-23984

Date
Feb 21, 2022
Research Description
Sensitive information disclosure discovered in wpDiscuz WordPress plugin (versions <= 7.3.11).
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-3869

CVE, Research URL

CVE-2023-3869

Date
Oct 20, 2023
Research Description
The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-47775

CVE, Research URL

CVE-2023-47775

Date
Nov 23, 2023
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-46310

CVE, Research URL

CVE-2023-46310

Date
Jun 04, 2024
Research Description
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in gVectors Team wpDiscuz allows Code Injection.This issue affects wpDiscuz: from n/a through 7.6.10.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2021-24806

CVE, Research URL

CVE-2021-24806

Date
Nov 08, 2021
Research Description
The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-46311

CVE, Research URL

CVE-2023-46311

Date
Dec 20, 2023
Research Description
Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team Comments – wpDiscuz.This issue affects Comments – wpDiscuz: from n/a through 7.6.3.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-47185

CVE, Research URL

CVE-2023-47185

Date
Nov 06, 2023
Research Description
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2024-2477

CVE, Research URL

CVE-2024-2477

Date
Apr 23, 2024
Research Description
The wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Alternative Text' field of an uploaded image in all versions up to, and including, 7.6.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-51691

CVE, Research URL

CVE-2023-51691

Date
Feb 01, 2024
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments – wpDiscuz allows Stored XSS.This issue affects Comments – wpDiscuz: from n/a through 7.6.12.
Affected versions
Min -, max -.
Status
vulnerable
Jun 09, 2024

Comments &#8211; wpDiscuz # CVE-2024-35681

CVE, Research URL

CVE-2024-35681

Date
Jun 08, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in gVectors Team wpDiscuz allows Stored XSS.This issue affects wpDiscuz: from n/a through 7.6.18.
Affected versions
Min -, max -.
Status
vulnerable
Jun 10, 2024

Comments &#8211; wpDiscuz # CVE-2023-46309

CVE, Research URL

CVE-2023-46309

Date
Jan 02, 2025
Research Description
Missing Authorization vulnerability in gVectors Team wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpDiscuz: from n/a through 7.6.10.
Affected versions
Min -, max -.
Status
vulnerable

Comments &#8211; wpDiscuz # CVE-2023-45760

CVE, Research URL

CVE-2023-45760

Date
Jan 02, 2025
Research Description
Missing Authorization vulnerability in gVectors Team wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpDiscuz: from n/a through 7.6.3.
Affected versions
Min -, max -.
Status
vulnerable
Aug 05, 2024

Comments &#8211; wpDiscuz # CVE-2024-6704

CVE, Research URL

CVE-2024-6704

Date
Aug 02, 2024
Research Description
The Comments – wpDiscuz plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 7.6.21. This is due to a lack of filtering of HTML tags in comments. This makes it possible for unauthenticated attackers to add HTML such as hyperlinks to comments when rich editing is disabled.
Affected versions
Min -, max -.
Status
vulnerable
Oct 27, 2024

Comments &#8211; wpDiscuz # CVE-2024-9488

CVE, Research URL

CVE-2024-9488

Date
Oct 25, 2024
Research Description
The Comments – wpDiscuz plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.6.24. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
Affected versions
Min -, max -.
Status
vulnerable
Oct 10, 2025

Comments &#8211; wpDiscuz # CVE-2025-59591

CVE, Research URL

CVE-2025-59591

Date
Sep 23, 2025
Research Description
Missing Authorization vulnerability in AdvancedCoding wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects wpDiscuz: from n/a through 7.6.33.
Affected versions
Min -, max -.
Status
vulnerable