EUVD-2026-11744

| CVE-2026-22193 HIGH
2026-03-13 VulnCheck
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 17, 2026 - 20:27 nvd
Patch available
Analysis Generated
Mar 13, 2026 - 07:58 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 07:58 euvd
EUVD-2026-11744
CVE Published
Mar 13, 2026 - 01:18 nvd
HIGH 8.1

Description

wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.

Analysis

High severity vulnerability in wpDiscuz (WordPress plugin). wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all WordPress installations using wpDiscuz and document current versions; disable the plugin if patching cannot be completed immediately. Within 7 days: Update wpDiscuz to version 7.6.47 or later across all affected WordPress instances and verify patch application. …

Sign in for detailed remediation steps.

Priority Score

41
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: 0

Share

EUVD-2026-11744 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy