wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through unescaped attachment URLs in HTML output by exploiting the WpdiscuzHelperUpload class. Attackers can craft malicious attachment records or filter hooks to inject arbitrary JavaScript into img and anchor tag attributes, executing code in the context of WordPress users viewing comments.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpdiscuz/ | Product |
| https://wordpress.org/plugins/wpdiscuz/#developers | Product Release Notes |
| https://www.vulncheck.com/advisories/wpdiscuz-before-cross-site-scripting-via-unescaped-attachment-urls | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 11:45
NVD link : CVE-2026-22210
Mitre link : CVE-2026-22210
CVE.ORG link : CVE-2026-22210
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
