Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22216: Improper Control of Interaction Frequency in gVectors wpDiscuz

0
Medium
VulnerabilityCVE-2026-22216cvecve-2026-22216
Published: Fri Mar 13 2026 (03/13/2026, 01:18:16 UTC)
Source: CVE Database V5
Vendor/Project: gVectors
Product: wpDiscuz

Description

CVE-2026-22216 is a medium severity vulnerability in gVectors wpDiscuz versions before 7. 6. 47. It involves missing rate limiting on the subscription endpoint, allowing unauthenticated attackers to subscribe arbitrary email addresses to post notifications. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses, causing unwanted notification emails to be sent to victims. This can lead to spam, user annoyance, and potential email service abuse. No authentication or user interaction is required, and the vulnerability affects the availability and integrity of email notification services. There are no known exploits in the wild yet, but the vulnerability is publicly disclosed. Organizations using vulnerable wpDiscuz versions should apply patches or implement mitigations promptly to prevent abuse. The threat primarily affects websites using wpDiscuz, which is popular in WordPress communities worldwide, especially in countries with high WordPress adoption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 02:40:34 UTC

Technical Analysis

CVE-2026-22216 is a vulnerability in the wpDiscuz WordPress plugin developed by gVectors, specifically affecting versions prior to 7.6.47. The issue stems from an improper control of interaction frequency, or missing rate limiting, on the wpdAddSubscription handler within the class.WpdiscuzHelperAjax.php file. This handler processes POST requests to subscribe email addresses to post notifications. Due to the lack of rate limiting and input validation, unauthenticated attackers can send crafted POST requests to subscribe arbitrary email addresses without consent. Moreover, the vulnerability allows the use of SQL LIKE wildcard characters in the subscription query, enabling attackers to match multiple email addresses in the database and trigger mass notification emails to those addresses. This can be exploited to generate spam or denial-of-service conditions on email servers by flooding victim inboxes with unwanted notifications. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction needed, and impacts on confidentiality, integrity, and availability at a low to medium level. Although no known exploits are reported in the wild, the public disclosure increases the risk of exploitation. The vulnerability primarily affects websites running vulnerable versions of wpDiscuz, a popular commenting plugin for WordPress, widely used globally. The absence of patch links suggests that immediate mitigation steps or updates should be sought from the vendor. This vulnerability highlights the importance of implementing rate limiting and input validation on subscription endpoints to prevent abuse.

Potential Impact

The primary impact of CVE-2026-22216 is the unauthorized subscription of arbitrary email addresses to post notifications, leading to unsolicited emails being sent to victims. This can result in significant user annoyance, potential reputational damage to affected websites, and increased load on email infrastructure, potentially causing denial-of-service conditions for email servers. Organizations may face increased support costs due to user complaints and may suffer from reduced trust if their notification systems are abused. While the vulnerability does not directly lead to data breaches or system compromise, the abuse of notification services can be leveraged as part of broader spam campaigns or social engineering attacks. The lack of authentication and user interaction requirements makes exploitation straightforward and scalable. The impact on confidentiality and integrity is limited but non-negligible due to the manipulation of subscription data and unsolicited information disclosure. Availability impacts arise from potential email service overload. Overall, the threat affects the reliability and trustworthiness of communication channels on affected websites.

Mitigation Recommendations

To mitigate CVE-2026-22216, organizations should immediately update wpDiscuz to version 7.6.47 or later once available, as this version addresses the missing rate limiting vulnerability. In the absence of an official patch, administrators should implement custom rate limiting on the wpdAddSubscription endpoint at the web server or application firewall level to restrict the frequency of subscription requests from the same IP address. Input validation should be enhanced to disallow SQL wildcard characters in email subscription requests to prevent mass matching of email addresses. Monitoring and alerting on unusual spikes in subscription activity can help detect exploitation attempts early. Additionally, implementing CAPTCHA or other challenge-response tests on subscription forms can reduce automated abuse. Reviewing email notification policies to limit the volume and frequency of notifications sent to users can mitigate the impact of potential abuse. Finally, educating users to recognize and report unsolicited notifications can aid in early detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.187Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b36fc22f860ef9434ef315

Added to database: 3/13/2026, 2:00:34 AM

Last enriched: 3/20/2026, 2:40:34 AM

Last updated: 4/28/2026, 10:06:59 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses