<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>BuddyPress Xprofile Custom Fields Type — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/buddypress-xprofile-custom-fields-type/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/buddypress-xprofile-custom-fields-type/feed.xml" rel="self" type="application/rss+xml"/><item><title>BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</guid><description>CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.</description><content:encoded><![CDATA[<p>BuddyPress Xprofile Custom Fields Type 2.6.3 is vulnerable to a remote code execution vulnerability, identified as CVE-2018-25308. This flaw enables authenticated users to execute arbitrary code on the server by deleting arbitrary files. The attack involves manipulating unescaped POST parameters, specifically <code>field_hiddenfile</code> and <code>field_deleteimg</code>, during profile editing actions. Successful exploitation allows attackers to unlink files from the server, potentially disrupting services or gaining unauthorized access. This vulnerability was published on 2026-04-29 and poses a significant threat to BuddyPress installations that have not applied the necessary patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a BuddyPress site running the vulnerable Xprofile Custom Fields Type 2.6.3 plugin.</li>
<li>The attacker navigates to their profile editing page.</li>
<li>The attacker crafts a malicious HTTP POST request to the profile update endpoint.</li>
<li>Within the POST request, the <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameters are manipulated to point to arbitrary files on the server.</li>
<li>The server-side script processes the crafted POST request without proper sanitization or validation of the file paths.</li>
<li>The <code>unlink()</code> function or an equivalent file deletion function is called with the attacker-controlled file paths.</li>
<li>The targeted files are deleted from the server file system.</li>
<li>The attacker can potentially delete critical system files or web application files, leading to remote code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25308 allows authenticated attackers to delete arbitrary files on the server. This can lead to a denial-of-service condition if critical system files are removed. The vulnerability can also potentially lead to remote code execution if the attacker is able to delete and replace executable files or inject malicious code into configuration files. While the number of victims is unknown, all BuddyPress installations using the vulnerable plugin are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for BuddyPress Xprofile Custom Fields Type to address CVE-2018-25308.</li>
<li>Implement input validation and sanitization on the server-side to prevent manipulation of file paths in POST parameters.</li>
<li>Monitor web server logs for suspicious POST requests targeting the profile update endpoint with unusual <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameter values (reference the attack chain).</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts based on the manipulation of specific POST parameters (reference the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>file-deletion</category><category>wordpress</category></item></channel></rss>