Description
wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability that allows unauthenticated attackers to subscribe arbitrary email addresses to post notifications by sending POST requests to the wpdAddSubscription handler in class.WpdiscuzHelperAjax.php. Attackers can exploit LIKE wildcard characters in the subscription query to match multiple email addresses and generate unwanted notification emails to victim accounts.
Problem types
Improper Control of Interaction Frequency
Product status
Any version before 7.6.47
7.6.47
Credits
Scott Moore - VulnCheck
References
wordpress.org/plugins/wpdiscuz/ (wpDiscuz Changelog)
wordpress.org/plugins/wpdiscuz/ (wpDiscuz)
www.vulncheck.com/...ion-endpoints-with-like-wildcard-bypass (VulnCheck Advisory: wpDiscuz before 7.6.47 - No Rate Limiting on Subscription Endpoints with LIKE Wildcard Bypass)