CVE-2026-22193

wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*

History

17 Mar 2026, 20:27

Type Values Removed Values Added
CPE cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*
References () https://wordpress.org/plugins/wpdiscuz/ - () https://wordpress.org/plugins/wpdiscuz/ - Product
References () https://wordpress.org/plugins/wpdiscuz/#developers - () https://wordpress.org/plugins/wpdiscuz/#developers - Product, Release Notes
References () https://www.vulncheck.com/advisories/wpdiscuz-before-sql-injection-in-getallsubscriptions - () https://www.vulncheck.com/advisories/wpdiscuz-before-sql-injection-in-getallsubscriptions - Third Party Advisory
First Time Gvectors
Gvectors wpdiscuz

13 Mar 2026, 19:54

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-13 19:54

Updated : 2026-03-17 20:27


NVD link : CVE-2026-22193

Mitre link : CVE-2026-22193

CVE.ORG link : CVE-2026-22193


JSON object : View

Products Affected

gvectors

  • wpdiscuz
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')