wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpdiscuz/ | Product |
| https://wordpress.org/plugins/wpdiscuz/#developers | Product Release Notes |
| https://www.vulncheck.com/advisories/wpdiscuz-before-no-rate-limiting-on-subscription-endpoints-with-like-wildcard-bypass | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 11:43
NVD link : CVE-2026-22216
Mitre link : CVE-2026-22216
CVE.ORG link : CVE-2026-22216
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-799
Improper Control of Interaction Frequency
