Description
WordPress Plugin Disqus Comment System is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and remote code execution vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to perform certain administrative actions and gain unauthorized access to the affected application, to execute arbitrary code with the privileges of the user running the application, to compromise the application or the underlying database, to access or modify data or to compromise a vulnerable system. WordPress Plugin Disqus Comment System version 2.75 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.76 or latest
References
https://blog.sucuri.net/2014/06/anatomy-of-a-remote-code-execution-bug-on-disqus.html
https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin/