Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22182: Missing Authorization in gVectors wpDiscuz

0
High
VulnerabilityCVE-2026-22182cvecve-2026-22182
Published: Fri Mar 13 2026 (03/13/2026, 01:17:59 UTC)
Source: CVE Database V5
Vendor/Project: gVectors
Product: wpDiscuz

Description

wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentication checks, and rate limiting.

AI-Powered Analysis

AILast updated: 03/13/2026, 02:14:18 UTC

Technical Analysis

CVE-2026-22182 is a denial of service vulnerability found in the gVectors wpDiscuz WordPress plugin before version 7.6.47. The vulnerability arises from missing authorization controls in the checkNotificationType() function, which is responsible for handling notification emails triggered by user interactions on posts and comments. Specifically, the wpdiscuz-ajax.php endpoint processes requests containing postId and comment_id parameters without verifying the authenticity of the requester via nonce tokens or authentication checks. Additionally, the function lacks rate limiting, allowing an attacker to send repeated requests that cause the system to send mass notification emails to subscribers. This can flood users’ inboxes, degrade email service quality, and potentially lead to email service provider blacklisting or resource exhaustion on the hosting server. The vulnerability is remotely exploitable without any privileges or user interaction, increasing its risk profile. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, no required privileges or user interaction, and high impact on availability. No patches or exploits are currently reported, but the vulnerability’s characteristics suggest it could be weaponized for spam campaigns or denial of service attacks against websites using wpDiscuz.

Potential Impact

The primary impact of CVE-2026-22182 is denial of service through mass unsolicited notification emails sent to subscribers of affected WordPress sites. This can overwhelm users with spam, degrade user experience, and cause reputational damage to website operators. Email service providers may throttle or block emails from the affected domains, disrupting legitimate communications. Hosting servers may experience increased load and resource exhaustion due to processing repeated notification requests, potentially leading to website downtime. Organizations relying on wpDiscuz for community engagement risk losing subscriber trust and may face operational disruptions. The vulnerability’s unauthenticated nature means attackers can exploit it at scale without needing credentials, increasing the likelihood of widespread abuse. Although no direct data confidentiality or integrity compromise is indicated, the availability impact and potential collateral damage to email infrastructure are significant concerns.

Mitigation Recommendations

To mitigate CVE-2026-22182, organizations should immediately update wpDiscuz to version 7.6.47 or later where the vulnerability is patched. If immediate patching is not possible, implement web application firewall (WAF) rules to detect and block excessive or anomalous requests to wpdiscuz-ajax.php, particularly those with suspicious postId and comment_id parameters. Rate limiting should be enforced at the application or server level to restrict the number of notification-triggering requests per IP address within a given timeframe. Additionally, monitor outgoing email traffic for unusual spikes in notification emails and configure email sending limits or throttling on mail servers. Review and harden WordPress security configurations, including disabling unnecessary AJAX endpoints if feasible. Finally, educate site administrators about the risk and encourage prompt application of security updates to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b36fc02f860ef9434ef286

Added to database: 3/13/2026, 2:00:32 AM

Last enriched: 3/13/2026, 2:14:18 AM

Last updated: 3/13/2026, 7:41:00 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses