CVE-2021-21389

8.1 HIGH

📋 TL;DR

This vulnerability in BuddyPress allows non-privileged users to escalate their privileges to administrator level by exploiting an issue in the REST API members endpoint. It affects BuddyPress installations from version 5.0.0 through 7.2.0. Any WordPress site using a vulnerable version of BuddyPress is at risk.

💻 Affected Systems

Products:
  • BuddyPress
Versions: 5.0.0 through 7.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with BuddyPress plugin installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where an attacker gains administrator privileges, potentially leading to data theft, defacement, or installation of backdoors.

🟠

Likely Case

Privilege escalation allowing attackers to modify site content, access sensitive user data, or install malicious plugins/themes.

🟢

If Mitigated

Limited impact with proper access controls, but still represents a significant authentication bypass vulnerability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a regular user account but no special privileges. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.1

Vendor Advisory: https://buddypress.org/2021/03/buddypress-7-2-1-security-release/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find BuddyPress and click 'Update Now'. 4. Verify update to version 7.2.1 or later.

🔧 Temporary Workarounds

Disable BuddyPress REST API

all

Temporarily disable the vulnerable REST API endpoint until patching is possible

Add to WordPress theme functions.php or custom plugin: add_filter('rest_authentication_errors', function($result) { if (!empty($result)) { return $result; } if (!is_user_logged_in()) { return new WP_Error('rest_not_logged_in', 'You are not currently logged in.', array('status' => 401)); } return $result; });

🧯 If You Can't Patch

  • Disable BuddyPress plugin entirely until patching is possible
  • Implement strict user registration controls and monitor for suspicious privilege changes

🔍 How to Verify

Check if Vulnerable:

Check BuddyPress version in WordPress admin panel under Plugins → Installed Plugins

Check Version:

wp plugin list --name=buddypress --field=version (if WP-CLI installed)

Verify Fix Applied:

Confirm BuddyPress version is 7.2.1 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual user privilege escalation events
  • Multiple failed authentication attempts followed by successful admin access
  • REST API requests to /wp-json/buddypress/v1/members endpoint with suspicious parameters

Network Indicators:

  • Unusual POST requests to BuddyPress REST API endpoints from regular user accounts

SIEM Query:

source="wordpress.log" AND ("privilege escalation" OR "admin access" OR "buddypress/members")

🔗 References

📤 Share & Export