Metrics
Affected Vendors & Products
Thu, 26 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| References |
|
Thu, 26 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | thingino-firmware up to commit e3f6a41 (published on 2026-03-15) contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter names. Attackers can exploit the eval function in parse_query() and parse_post() functions to achieve remote code execution and perform privileged configuration changes including root password reset and SSH authorized_keys modification, resulting in full persistent device compromise. | wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers. |
| Title | thingino-firmware api.cgi Unauthenticated Command Injection in Captive Portal | wpDiscuz before 7.6.47 - Cross-Site Scripting via Unescaped Custom CSS in Style Tag |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers. | thingino-firmware up to commit e3f6a41 (published on 2026-03-15) contains an unauthenticated os command injection vulnerability in the WiFi captive portal CGI script that allows remote attackers to execute arbitrary commands as root by injecting malicious code through unsanitized HTTP parameter names. Attackers can exploit the eval function in parse_query() and parse_post() functions to achieve remote code execution and perform privileged configuration changes including root password reset and SSH authorized_keys modification, resulting in full persistent device compromise. |
| Title | wpDiscuz before 7.6.47 - Cross-Site Scripting via Unescaped Custom CSS in Style Tag | thingino-firmware api.cgi Unauthenticated Command Injection in Captive Portal |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Fri, 13 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 13 Mar 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability in the customCss field that allows administrators to inject malicious scripts by breaking out of style tags. Attackers with admin access can inject payloads like </style><script>alert(1)</script> in the custom CSS setting to execute arbitrary JavaScript in user browsers. | |
| Title | wpDiscuz before 7.6.47 - Cross-Site Scripting via Unescaped Custom CSS in Style Tag | |
| First Time appeared |
Gvectors
Gvectors wpdiscuz |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Gvectors
Gvectors wpdiscuz |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-26T18:43:47.480Z
Reserved: 2026-01-06T16:47:17.187Z
Link: CVE-2026-22209
Updated: 2026-03-13T14:15:14.390Z
Status : Modified
Published: 2026-03-13T19:54:11.003
Modified: 2026-03-26T19:16:32.410
Link: CVE-2026-22209
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:59:52Z