Input validation vulnerability in Disqus Comment System 2.76

Attackers were able to exploit vulnerabilities in the Disqus Comment System plugin before version 2.76 for WordPress. This allowed them to hijack the authentication of administrators and perform cross-site scripting (XSS) attacks. They could also reset or delete plugin options. All of this was done by using specific parameters in the wp-admin/edit-comments.php in manage.php file.

Detected in:

Disqus Comment System fixed vulnerable versions: >= * < 2.76

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.