wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that allows attackers to manipulate comment votes by obtaining fresh nonces and bypassing rate limiting through client-controlled headers. Attackers can vary User-Agent headers to reset rate limits, request nonces from the unauthenticated wpdGetNonce endpoint, and vote multiple times using IP rotation or reverse proxy header manipulation.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpdiscuz/ | Product |
| https://wordpress.org/plugins/wpdiscuz/#developers | Product Release Notes |
| https://www.vulncheck.com/advisories/wpdiscuz-before-vote-manipulation-via-nonce-oracle-and-ip-rotation | Third Party Advisory |
Configurations
History
17 Mar 2026, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gvectors
Gvectors wpdiscuz |
|
| CPE | cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* | |
| References | () https://wordpress.org/plugins/wpdiscuz/ - Product | |
| References | () https://wordpress.org/plugins/wpdiscuz/#developers - Product, Release Notes | |
| References | () https://www.vulncheck.com/advisories/wpdiscuz-before-vote-manipulation-via-nonce-oracle-and-ip-rotation - Third Party Advisory |
13 Mar 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:54
Updated : 2026-03-17 20:26
NVD link : CVE-2026-22199
Mitre link : CVE-2026-22199
CVE.ORG link : CVE-2026-22199
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-290
Authentication Bypass by Spoofing
