What this page helps you verify fast
This hub clusters every indexed record for Comments – wpDiscuz so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin Comments – wpDiscuz (`wpdiscuz`), including severity, CVE references, affected versions, and patch status.
Recent tracked CVEs on this page include CVE-2025-68997, CVE-2025-13820 and CVE-2025-59591, so operators can jump from disclosure to patch validation without scanning the full feed first.
Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.
Comments – wpDiscuz <= 7.6.24 - Authentication Bypass via WordPress.com OAuth provider
Comments - wpDiscuz 7.0 - 7.0.4 - Unauthenticated Arbitrary File Upload leading to Remote Code Execution
Comments - wpDiscuz <= 5.3.5 - Blind SQL Injection via order Parameter
Comments – wpDiscuz <= 7.6.39 - Unauthenticated Authentication Bypass Through Account Takeover
wpDiscuz <= 7.6.11 - Unauthenticated Stored Cross-Site Scripting via Comment Uploaded Image Filename
Comments – wpDiscuz <= 7.6.18 - Authenticated (Contributor+) Stored Cross-Site Scripting
wpDiscuz <= 7.6.15 - Authenticated (Author+) Stored Cross-Site Scripting via Uploaded Image Alternative Text
wpDiscuz <= 7.6.3 - Missing Authorization via AJAX actions
This hub clusters every indexed record for Comments – wpDiscuz so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The Comments – wpDiscuz plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.6.42 due to missing validation on a user controlled key...
The Comments – wpDiscuz plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 7.6.39. This is due to the plugin not properly validating a user's i...
The Comments – wpDiscuz plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 7.6.33. This makes it...
Sorted by latest disclosure date so newly published issues surface first.
The Comments – wpDiscuz plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.6.42 due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to perform unauthorized actions.
The Comments – wpDiscuz plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 7.6.39. This is due to the plugin not properly validating a user's identity through the disqus.com provider. This makes it possible for unauthenticated attack...
The Comments – wpDiscuz plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 7.6.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform a...
The Comments – wpDiscuz plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.6.24. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to...
The Comments – wpDiscuz plugin for WordPress is vulnerable to HTML Injection in all versions up to, and including, 7.6.21. This is due to a lack of filtering of HTML tags in comments. This makes it possible for unauthenticated attackers to add HTML such as hyperlinks to comments...
The Comments – wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 7.6.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with...
The wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Alternative Text' field of an uploaded image in all versions up to, and including, 7.6.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated a...
The Comments – wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 7.6.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administr...
The wpDiscuz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 7.6.11. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers to dismiss admin notices via...
The Comments – wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the filename of an image uploaded in a comment submission in all versions up to, and including, 7.6.11 due to insufficient input sanitization and output escaping. This makes it possible...
The wpDiscuz plugin for WordPress is vulnerable to Arbitrary Content Injection in versions up to, and including, 7.6.10. The cause of this vulnerability is undisclosed at this time. However, this vulnerability makes it possible for unauthenticated attackers to inject new content...
The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on an unknown function in versions up to, and including, 7.6.3. This makes it possible for authenticated attackers with author-level permissions and above to...