BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscriber+) Privilege Escalation to Administrator via Group Blog IDOR
Summary
| CVE | CVE-2026-5144 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-11 02:16:02 UTC |
| Updated | 2026-04-11 02:16:02 UTC |
| Description | The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers who create their own group) to associate their group with any blog on the Multisite network, including the main site (blog ID 1). The `default-member` parameter accepts any WordPress role, including `administrator`, without validation against a whitelist. When combined with `groupblog-silent-add`, any user who joins the attacker's group is automatically added to the targeted blog with the injected role. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate any user (including themselves via a second account) to Administrator on the main site of the Multisite network. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-269 | CWE-269 CWE-269 Improper Privilege Management
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Boonebgorges | BuddyPress Groupblog | affected 1.9.3 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| www.wordfence.com/threat-intel/vulnerabilities/id/8129046a-5aa5-4644-babc-0eca9... | [email protected] | www.wordfence.com | |
| plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| github.com/boonebgorges/bp-groupblog/commit/b824593add9e2c53ef4f0d2e0824... | [email protected] | github.com | |
| plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php | [email protected] | plugins.trac.wordpress.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Nabil Irawan (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-03-30T14:04:46.000Z | Vendor Notified |
| CNA | 2026-04-10T12:09:00.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.