Description
wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through unescaped attachment URLs in HTML output by exploiting the WpdiscuzHelperUpload class. Attackers can craft malicious attachment records or filter hooks to inject arbitrary JavaScript into img and anchor tag attributes, executing code in the context of WordPress users viewing comments.
Published: 2026-03-13
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Scripting
Action: Apply Patch
AI Analysis

Impact

wpDiscuz before 7.6.47 has a cross‑site scripting (XSS) vulnerability that allows attackers to inject arbitrary JavaScript by exploiting unescaped attachment URLs in the HTML output. The flaw resides in the WpdiscuzHelperUpload class and permits malicious code to be inserted into img and anchor tag attributes, which executes in the browser context of any WordPress user who views a comment containing the crafted attachment. This is a standard input validation weakness identified as CWE-79 and can lead to session hijacking, defacement, or the execution of further client‑side attacks.

Affected Systems

All WordPress sites that use the gVectors wpDiscuz plugin with a version earlier than 7.6.47 are affected. The vulnerability applies to any instance where the plugin’s attachment URLs are rendered in comment HTML, as indicated by the CPE string cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*.

Risk and Exploitability

The CVSS score for this issue is 2.1, indicating low severity, and the EPSS score is less than 1%. The vulnerability is not listed in the CISA KEV catalog. Attackers would need the ability to create or modify attachment records within wpDiscuz, such as an administrator or a user with upload rights, to craft the malicious URLs. Because the exploit works purely client‑side, success depends on the victim visiting the affected comment. While the overall likelihood of exploitation is low, any XSS flaw presents a potential vector for user‑targeted attacks and should be remediated promptly.

Generated by OpenCVE AI on March 17, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update wpDiscuz to version 7.6.47 or later to remove the vulnerability.
  • If an update cannot be applied immediately, disable or delete the wpDiscuz plugin until a patch is available.
  • Review existing attachments and delete any that appear suspicious or originate from untrusted sources.
  • Ensure WordPress core and all plugins are kept up to date, and consider implementing a WAF or security plugin that filters out XSS payloads.

Generated by OpenCVE AI on March 17, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 02:00:00 +0000

Type Values Removed Values Added
Description wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability that allows attackers to inject malicious code through unescaped attachment URLs in HTML output by exploiting the WpdiscuzHelperUpload class. Attackers can craft malicious attachment records or filter hooks to inject arbitrary JavaScript into img and anchor tag attributes, executing code in the context of WordPress users viewing comments.
Title wpDiscuz before 7.6.47 - Cross-Site Scripting via Unescaped Attachment URLs
First Time appeared Gvectors
Gvectors wpdiscuz
Weaknesses CWE-79
CPEs cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
Vendors & Products Gvectors
Gvectors wpdiscuz
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Gvectors Wpdiscuz
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-13T14:14:59.813Z

Reserved: 2026-01-06T16:47:17.187Z

Link: CVE-2026-22210

cve-icon Vulnrichment

Updated: 2026-03-13T14:14:54.571Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:11.220

Modified: 2026-03-17T11:45:35.723

Link: CVE-2026-22210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:59:51Z

Weaknesses