wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that allows attackers to manipulate comment votes by obtaining fresh nonces and bypassing rate limiting through client-controlled headers. Attackers can vary User-Agent headers to reset rate limits, request nonces from the unauthenticated wpdGetNonce endpoint, and vote multiple times using IP rotation or reverse proxy header manipulation.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpdiscuz/ | Product |
| https://wordpress.org/plugins/wpdiscuz/#developers | Product Release Notes |
| https://www.vulncheck.com/advisories/wpdiscuz-before-vote-manipulation-via-nonce-oracle-and-ip-rotation | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 20:26
NVD link : CVE-2026-22199
Mitre link : CVE-2026-22199
CVE.ORG link : CVE-2026-22199
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-290
Authentication Bypass by Spoofing
