wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 13 Mar 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts. | |
| Title | wpDiscuz before 7.6.47 - No Rate Limiting on Subscription Endpoints with LIKE Wildcard Bypass | |
| First Time appeared |
Gvectors
Gvectors wpdiscuz |
|
| Weaknesses | CWE-799 | |
| CPEs | cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Gvectors
Gvectors wpdiscuz |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-13T01:18:16.708Z
Reserved: 2026-01-06T16:47:17.187Z
Link: CVE-2026-22216
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:49:11Z
Weaknesses