Description
wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentication checks, and rate limiting.
Published: 2026-03-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

wpDiscuz, a WordPress comment plugin, prior to version 7.6.47 contains an unauthenticated denial‑of‑service weakness that allows attackers to trigger an uncontrolled flood of email notifications. The vulnerability is located in the checkNotificationType() function, which is exposed through the wpdiscuz-ajax.php endpoint without requiring any nonce verification, authentication, or rate limiting. When an attacker repeatedly supplies arbitrary postId and comment_id parameters, the plugin sends a large volume of notification emails to all subscribers, exhausting mail server resources and interrupting normal service. This flaw maps to CWE-770 (Excessive Resource Consumption) and CWE-862 (Missing Access Control).

Affected Systems

The vulnerability affects the gVectors:wpDiscuz plugin distributed via WordPress. All releases before 7.6.47 are vulnerable. The Common Platform Enumeration for the product is cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*. Administrators using older plugin versions should verify their installation and plan an update.

Risk and Exploitability

The flaw has a CVSS score of 8.7, classifying it as high severity. The EPSS score is below 1 %, and the vulnerability is not listed in the CISA KEV catalog, suggesting that no known weaponised exploit exists. The attack is likely remote and entirely unauthenticated, requiring only the ability to issue HTTP requests to the wpdiscuz-ajax.php endpoint. Because it lacks authentication checks, a threat actor can rapidly flood the system with notification emails, resulting in immediate denial of service to legitimate users and potential reputational damage.

Generated by OpenCVE AI on March 17, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update wpDiscuz to version 7.6.47 or later
  • Verify that no older version remains installed and that wpdiscuz-ajax.php is not exposed unnecessarily
  • Implement rate limiting or blocking of repetitive requests to wpdiscuz-ajax.php via a web‑application firewall

Generated by OpenCVE AI on March 17, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Fri, 13 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
Description wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentication checks, and rate limiting.
Title wpDiscuz before 7.6.47 - Unauthenticated Email Notification Flood via wpdCheckNotificationType
First Time appeared Gvectors
Gvectors wpdiscuz
Weaknesses CWE-862
CPEs cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
Vendors & Products Gvectors
Gvectors wpdiscuz
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Gvectors Wpdiscuz
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-13T14:47:20.700Z

Reserved: 2026-01-06T16:47:17.182Z

Link: CVE-2026-22182

cve-icon Vulnrichment

Updated: 2026-03-13T14:47:13.905Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:07.480

Modified: 2026-03-17T20:23:18.363

Link: CVE-2026-22182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T10:00:01Z

Weaknesses