Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Gvectors Subscribe
Filtered by product Wpdiscuz
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-13640 1 Gvectors 1 Wpdiscuz 2023-01-27 7.5 HIGH 9.8 CRITICAL
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
CVE-2022-43492 1 Gvectors 1 Wpdiscuz 2022-11-22 N/A 8.8 HIGH
Auth. (subscriber+) Insecure Direct Object References (IDOR) vulnerability in Comments – wpDiscuz plugin 7.4.2 on WordPress.
CVE-2022-23984 1 Gvectors 1 Wpdiscuz 2022-03-01 5.0 MEDIUM 7.5 HIGH
Sensitive information disclosure discovered in wpDiscuz WordPress plugin (versions <= 7.3.11).
CVE-2020-24186 1 Gvectors 1 Wpdiscuz 2022-01-01 7.5 HIGH 10.0 CRITICAL
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
CVE-2021-24806 1 Gvectors 1 Wpdiscuz 2021-11-09 4.3 MEDIUM 4.3 MEDIUM
The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment.
CVE-2021-24737 1 Gvectors 1 Wpdiscuz 2021-10-15 3.5 LOW 4.8 MEDIUM
The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.