CVE-2025-49453

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the BP Profile as Homepage WordPress plugin allows attackers to perform unauthorized actions on behalf of authenticated users, leading to stored cross-site scripting (XSS). This affects WordPress sites using the BP Profile as Homepage plugin versions up to 1.1, potentially compromising user sessions and site integrity.

💻 Affected Systems

Products:
  • BP Profile as Homepage WordPress plugin
Versions: n/a through 1.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with BuddyPress or similar user profile functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts that execute in users' browsers, leading to session hijacking, credential theft, site defacement, or malware distribution to visitors.

🟠

Likely Case

Attackers trick authenticated administrators into performing actions that inject malicious JavaScript, which then executes for other users visiting affected pages.

🟢

If Mitigated

With proper CSRF tokens and input validation, unauthorized actions are blocked, preventing the XSS injection vector entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user (e.g., admin) to click a malicious link, but CSRF-to-XSS chains are common and easily weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/bp-profile-as-homepage/vulnerability/wordpress-bp-profile-as-homepage-plugin-1-1-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'BP Profile as Homepage' and update to version 1.2 or later. 4. If update not available, deactivate and delete the plugin.

🔧 Temporary Workarounds

Implement CSRF Protection Manually

all

Add nonce verification to plugin forms and actions to prevent CSRF attacks.

Edit plugin PHP files to include wp_nonce_field() and wp_verify_nonce() checks on form submissions.

Disable Plugin

linux

Temporarily deactivate the plugin until patched.

wp plugin deactivate bp-profile-as-homepage

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with CSRF and XSS protection rules.
  • Restrict plugin access to trusted users only via role-based controls.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for 'BP Profile as Homepage' version 1.1 or earlier.

Check Version:

wp plugin get bp-profile-as-homepage --field=version

Verify Fix Applied:

Confirm plugin version is 1.2 or later in WordPress admin, and test form submissions for CSRF tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to plugin endpoints without referrer or nonce parameters in WordPress debug/access logs.

Network Indicators:

  • HTTP requests with suspicious payloads to /wp-admin/admin-ajax.php or plugin-specific URLs.

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/bp-profile-as-homepage/" OR user_agent CONTAINS "malicious")

🔗 References

📤 Share & Export