Vulnerabilities and security researches forbuddypress buddypress
Direction: ascendingJun 06, 2024
BuddyPress # CVE-2012-2109
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 05, 2012
- Research Description
- SQL injection vulnerability in wp-load.php in the BuddyPress plugin 1.5.x before 1.5.5 of WordPress allows remote attackers to execute arbitrary SQL commands via the page parameter in an activity_widget_filter action.
- Affected versions
-
Min 5.0.0, max 6.4.0.
- Status
-
vulnerable
BuddyPress # CVE-2014-1889
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 10, 2018
- Research Description
- The Group creation process in the Buddypress plugin before 1.9.2 for WordPress allows remote authenticated users to gain control of arbitrary groups by leveraging a missing permissions check.
- Affected versions
-
max 1.9.2.
- Status
-
vulnerable
BuddyPress # CVE-2014-1888
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 01, 2014
- Research Description
- Cross-site scripting (XSS) vulnerability in the BuddyPress plugin before 1.9.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the name field to groups/create/step/group-details. NOTE: this can be exploited without authentication by leveraging CVE-2014-1889.
- Affected versions
-
max 1.9.2.
- Status
-
vulnerable
BuddyPress # CVE-2021-21389
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 27, 2021
- Research Description
- BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
- Affected versions
-
Min 5.0.0, max 7.2.0.
- Status
-
vulnerable
BuddyPress # CVE-2020-5244
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 24, 2020
- Research Description
- In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
- Affected versions
-
max 2.3.5.
- Status
-
vulnerable
BuddyPress # CVE-2023-50880
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 29, 2023
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.
- Affected versions
-
max 11.3.2.
- Status
-
vulnerable
BuddyPress # CVE-2024-3974
- CVE, Research URL
- Home page URL
- Application
- Date
- May 14, 2024
- Research Description
- The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘user_name’ parameter in versions up to, and including, 12.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 12.4.1.
- Status
-
vulnerable
Jun 13, 2024
BuddyPress # CVE-2024-4892
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 12, 2024
- Research Description
- The BuddyPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘display_name’ parameter in versions up to, and including, 12.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 12.5.1.
- Status
-
vulnerable
Oct 26, 2024
BuddyPress # CVE-2024-10011
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 25, 2024
- Research Description
- The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
- Affected versions
-
max 14.2.1.
- Status
-
vulnerable
Nov 10, 2025
BuddyPress # CVE-2025-62022
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 22, 2025
- Research Description
- Missing Authorization vulnerability in BuddyPress BuddyPress buddypress.This issue affects BuddyPress: from n/a through <= 14.3.4.
- Affected versions
-
max 14.4.0.
- Status
-
vulnerable