
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-24806 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the wpDiscuz WordPress plugin versions below 7.3.4. The vulnerability was discovered and publicly disclosed on October 11, 2021, with a CVSS score of 5.4 (medium severity). The affected component, wpDiscuz, is a popular WordPress comment plugin (WPScan).
The vulnerability stems from inadequate CSRF protection mechanisms in the plugin's comment management functionality. The issue affects multiple actions including adding, editing, and deleting comments, as well as thread management operations like wpdCloseThread (for closing/opening threads) and wpdStickComment (for sticking/unsticking comments). The vulnerability is classified as CWE-352 and falls under the OWASP Top 10 category A2: Broken Authentication and Session Management (WPScan).
The vulnerability allows attackers to perform unauthorized actions by making logged-in users, including administrators, execute unintended comment-related operations. This includes forcing users to post arbitrary comments, edit existing comments, or delete comments without their knowledge. Additionally, attackers can manipulate thread status and comment visibility settings (WPScan).
The vulnerability has been fixed in wpDiscuz version 7.3.4. Users are advised to update to this version or later to protect against potential CSRF attacks. No alternative workarounds have been publicly documented (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."