wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpdiscuz/ | Product |
| https://wordpress.org/plugins/wpdiscuz/#developers | Product Release Notes |
| https://www.vulncheck.com/advisories/wpdiscuz-before-sql-injection-in-getallsubscriptions | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 20:27
NVD link : CVE-2026-22193
Mitre link : CVE-2026-22193
CVE.ORG link : CVE-2026-22193
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
