Description
wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.
Published: 2026-03-13
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection resulting in unauthorized data exposure and database modification
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is an SQL injection flaw located in the getAllSubscriptions() function of the wpDiscuz WordPress plugin prior to version 7.6.47. Because user-supplied parameters—email, activation_key, subscription_date, and imported_from—are incorporated into SQL queries without proper escaping, an attacker can inject malicious SQL code. The injection can lead to unauthorized data extraction and potentially the modification or deletion of database records, jeopardizing confidentiality and integrity of stored information.

Affected Systems

The affected product is the wpDiscuz plugin developed by gVectors, available on WordPress. All installations running wpDiscuz versions earlier than 7.6.47 are vulnerable. The vulnerability is present in all instances where the getAllSubscriptions() function is accessible via the plugin's public API or interface.

Risk and Exploitability

The CVSS score is 9.2, indicating a high severity. EPSS score is below 1%, suggesting low current exploitation probability. It is not listed in the CISA KEV catalog. The attack likely requires remote access to the plugin’s parameters, which are exposed through its public endpoints. Attackers can exploit the flaw by sending crafted requests containing malicious SQL in the affected parameters, leading to data compromise. The vulnerability’s impact is local to the database accessed by the WordPress installation, but if the database is used across multiple applications, the risk extends beyond the web environment.

Generated by OpenCVE AI on March 17, 2026 at 21:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade wpDiscuz to version 7.6.47 or later
  • Verify the update and test subscription features to ensure normal operation

Generated by OpenCVE AI on March 17, 2026 at 21:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
Description wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.
Title wpDiscuz before 7.6.47 - SQL Injection in getAllSubscriptions()
First Time appeared Gvectors
Gvectors wpdiscuz
Weaknesses CWE-89
CPEs cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
Vendors & Products Gvectors
Gvectors wpdiscuz
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Gvectors Wpdiscuz
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-13T16:10:03.471Z

Reserved: 2026-01-06T16:47:17.183Z

Link: CVE-2026-22193

cve-icon Vulnrichment

Updated: 2026-03-13T16:09:58.695Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:09.720

Modified: 2026-03-17T20:27:42.513

Link: CVE-2026-22193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:59:57Z

Weaknesses