Impact
wpDiscuz versions before 7.6.47 contain an unescaped custom CSS field that allows administrators to insert arbitrary JavaScript. By closing the style tag and adding a script element, an admin can cause visited browsers to execute malicious payloads. This flaw is a classic XSS (CWE‑79) that can be used to deface content, steal session cookies or perform phishing attacks.
Affected Systems
The affected product is the wpDiscuz WordPress commenting plugin developed by gVectors. All installations using a version older than 7.6.47 are subject to this issue. No specific sub‑versions are identified beyond the general revision number.
Risk and Exploitability
The CVSS base score of 5.1 indicates medium severity. The EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Because the flaw requires an account with administrative privileges, the attack vector is local to the site’s admin users. An attacker who gains or is already privileged can supply custom CSS and trigger the script injection, which runs in the context of any visitor’s browser.
OpenCVE Enrichment