wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers.
References
Configurations
History
26 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers. | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References |
|
|
| CWE | CWE-79 |
20 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| Summary |
|
20 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-78 | |
| References |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
| Summary | (en) thingino-firmware up to commit e3f6a41 (published on 2026-03-15) contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter names. Attackers can exploit the eval function in parse_query() and parse_post() functions to achieve remote code execution and perform privileged configuration changes including root password reset and SSH authorized_keys modification, resulting in full persistent device compromise. |
17 Mar 2026, 11:46
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gvectors
Gvectors wpdiscuz |
|
| CPE | cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* | |
| References | () https://wordpress.org/plugins/wpdiscuz/ - Product | |
| References | () https://wordpress.org/plugins/wpdiscuz/#developers - Product, Release Notes | |
| References | () https://www.vulncheck.com/advisories/wpdiscuz-before-cross-site-scripting-via-unescaped-custom-css-in-style-tag - Third Party Advisory |
13 Mar 2026, 19:54
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-13 19:54
Updated : 2026-03-26 19:16
NVD link : CVE-2026-22209
Mitre link : CVE-2026-22209
CVE.ORG link : CVE-2026-22209
JSON object : View
Products Affected
gvectors
- wpdiscuz
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
