Vulnerabilities > Gvectors > Wpdiscuz > 5.3.6
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-20 | CVE-2023-46311 | Authorization Bypass Through User-Controlled Key vulnerability in Gvectors Wpdiscuz Authorization Bypass Through User-Controlled Key vulnerability in gVectors Team Comments – wpDiscuz.This issue affects Comments – wpDiscuz: from n/a through 7.6.3. | 6.5 |
2023-11-22 | CVE-2023-47775 | Cross-Site Request Forgery (CSRF) vulnerability in Gvectors Wpdiscuz Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions. | 8.8 |
2023-11-06 | CVE-2023-47185 | Cross-site Scripting vulnerability in Gvectors Wpdiscuz Unauth. | 6.1 |
2023-10-20 | CVE-2023-3869 | Missing Authorization vulnerability in Gvectors Wpdiscuz The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. | 5.3 |
2023-10-20 | CVE-2023-3998 | Missing Authorization vulnerability in Gvectors Wpdiscuz The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. | 5.3 |
2021-10-11 | CVE-2021-24737 | Cross-site Scripting vulnerability in Gvectors Wpdiscuz The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | 4.8 |