Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 13 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that allows attackers to delete all comments associated with an email address by crafting a malicious GET request with a valid HMAC key. Attackers can embed the deletecomments action URL in image tags or other resources to trigger permanent deletion of comments without user confirmation or POST-based CSRF protection. | |
| Title | wpDiscuz before 7.6.47 - Destructive GET Action Deletes All Comments by Email | |
| First Time appeared |
Gvectors
Gvectors wpdiscuz |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Gvectors
Gvectors wpdiscuz |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-13T16:08:59.351Z
Reserved: 2026-01-06T16:47:17.185Z
Link: CVE-2026-22202
Updated: 2026-03-13T16:08:56.611Z
Status : Analyzed
Published: 2026-03-13T19:54:10.353
Modified: 2026-03-17T20:24:54.670
Link: CVE-2026-22202
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:59:54Z