Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22202: Cross-Site Request Forgery (CSRF) in gVectors wpDiscuz

0
Medium
VulnerabilityCVE-2026-22202cvecve-2026-22202
Published: Fri Mar 13 2026 (03/13/2026, 01:18:08 UTC)
Source: CVE Database V5
Vendor/Project: gVectors
Product: wpDiscuz

Description

CVE-2026-22202 is a cross-site request forgery (CSRF) vulnerability in the wpDiscuz WordPress plugin before version 7. 6. 47. This flaw allows attackers to delete all comments associated with a specific email address by sending a crafted GET request containing a valid HMAC key. The vulnerability arises because the deletecomments action can be triggered via image tags or other embedded resources without requiring POST-based CSRF protections or user confirmation. Exploitation does not require authentication but does require user interaction, such as visiting a malicious webpage. The CVSS 4. 0 score is 6. 1 (medium severity), reflecting the moderate impact on comment integrity and availability but no direct compromise of confidentiality or site control. No known exploits are currently in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:33:34 UTC

Technical Analysis

CVE-2026-22202 is a CSRF vulnerability affecting the wpDiscuz plugin for WordPress versions prior to 7.6.47. The vulnerability allows an attacker to delete all comments linked to a particular email address by crafting a malicious GET request that includes a valid HMAC key. The core issue is that the deletecomments action can be triggered via GET requests embedded in image tags or other HTML elements, bypassing typical CSRF protections that rely on POST requests and user confirmation dialogs. This means an attacker can embed a URL in a webpage or email that, when visited by an authenticated user, causes the deletion of comments without their consent. The attack requires user interaction (visiting a malicious page) but no authentication or elevated privileges, as the HMAC key validation is insufficient to prevent CSRF. The vulnerability impacts the integrity and availability of user-generated content (comments) but does not expose sensitive data or allow site takeover. The CVSS 4.0 vector indicates network attack vector, low attack complexity, partial attack prerequisites, user interaction required, no confidentiality impact, high integrity and availability impact, and no scope change. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The primary impact of this vulnerability is the unauthorized deletion of user comments associated with specific email addresses, which can lead to loss of valuable user-generated content and damage to community engagement on affected WordPress sites. This undermines the integrity and availability of the comment system, potentially disrupting discussions and user trust. While it does not directly compromise site confidentiality or allow full site control, the ability to delete comments without authorization can be leveraged in targeted harassment campaigns or to censor legitimate feedback. For organizations relying on wpDiscuz for community interaction, this can degrade user experience and harm reputation. The attack requires user interaction but no authentication, increasing the risk of widespread exploitation if attackers distribute malicious links broadly. The lack of POST-based CSRF protections and reliance on a valid HMAC key that can be abused via GET requests makes mitigation urgent to prevent content tampering.

Mitigation Recommendations

Organizations should immediately update wpDiscuz to version 7.6.47 or later, where this vulnerability is patched. Until the update is applied, administrators can implement web application firewall (WAF) rules to block suspicious GET requests containing the deletecomments action or HMAC parameters. Additionally, disabling or restricting the deletecomments functionality to authenticated users with proper CSRF tokens and enforcing POST-only methods for state-changing actions can mitigate exploitation. Site owners should audit comment deletion logs for suspicious activity and educate users about avoiding clicking untrusted links. Implementing Content Security Policy (CSP) headers to restrict embedding of malicious resources and monitoring for unusual traffic patterns targeting comment deletion endpoints can also help. Finally, plugin developers should adopt secure coding practices that enforce strict CSRF protections and avoid using GET requests for destructive actions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.185Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b36fc02f860ef9434ef2a9

Added to database: 3/13/2026, 2:00:32 AM

Last enriched: 3/20/2026, 2:33:34 AM

Last updated: 4/28/2026, 7:25:30 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses