gVectors wpDiscuz 3.0.6 for WordPress

CPE Details

gVectors wpDiscuz 3.0.6 for WordPress
3.0.6
2020-06-19
17h14 +00:00
2020-06-19
17h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gvectors:wpdiscuz:3.0.6:*:*:*:*:wordpress:*:*

Informations

Vendor

gvectors

Product

wpdiscuz

Version

3.0.6

Target Software

wordpress

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-9488 2024-10-25 05h35 +00:00 The Comments – wpDiscuz plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.6.24. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
9.8
Critical
CVE-2024-35681 2024-06-08 15h00 +00:00 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in gVectors Team wpDiscuz allows Stored XSS.This issue affects wpDiscuz: from n/a through 7.6.18.
6.5
Medium
CVE-2023-51691 2024-02-01 10h57 +00:00 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments – wpDiscuz allows Stored XSS.This issue affects Comments – wpDiscuz: from n/a through 7.6.12.
5.9
Medium
CVE-2023-46311 2023-12-20 13h32 +00:00 Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team Comments – wpDiscuz.This issue affects Comments – wpDiscuz: from n/a through 7.6.3.
6.5
Medium
CVE-2023-47775 2023-11-22 18h23 +00:00 Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
8.8
High
CVE-2023-47185 2023-11-06 10h56 +00:00 Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
6.1
Medium
CVE-2023-3869 2023-10-20 07h29 +00:00 The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment.
5.3
Medium
CVE-2023-3998 2023-10-20 07h29 +00:00 The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a post.
5.3
Medium
CVE-2022-23984 2022-02-21 17h49 +00:00 Sensitive information disclosure discovered in wpDiscuz WordPress plugin (versions <= 7.3.11).
7.5
High
CVE-2021-24806 2021-11-08 16h35 +00:00 The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment.
4.3
Medium
CVE-2021-24737 2021-10-11 08h45 +00:00 The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
4.8
Medium
CVE-2020-13640 2020-06-18 12h34 +00:00 A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
9.8
Critical