Input validation vulnerability in Comments – wpDiscuz 7.6.6

The WordPress plugin wpDiscuz is vulnerable to an attack known as SQL Injection up to, and including, version 7.6.5. This means that someone who is not authorized to access the plugin can use the ‘visibleCommentIds’ parameter to add extra SQL commands to the existing query. These commands can be used to gain access to sensitive information stored in the database. For a successful attack, the ‘Live Update’ function needs to be enabled for people who are logged into the system, and the ‘Enable Live Update for Guests’ setting needs to be enabled for people who are not logged in.

Detected in:

Comments – wpDiscuz fixed vulnerable versions: >= * < 7.6.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.