<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Buddypress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/buddypress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 02:19:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/buddypress/feed.xml" rel="self" type="application/rss+xml"/><item><title>BuddyPress Groupblog Plugin Privilege Escalation Vulnerability (CVE-2026-5144)</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</link><pubDate>Sat, 11 Apr 2026 02:19:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-privesc/</guid><description>The BuddyPress Groupblog plugin for WordPress is vulnerable to privilege escalation (CVE-2026-5144), allowing a low-privileged user to gain administrator access on a WordPress Multisite network by manipulating group blog settings.</description><content:encoded><![CDATA[<p>The BuddyPress Groupblog plugin, versions 1.9.3 and below, contains a critical privilege escalation vulnerability (CVE-2026-5144). This flaw allows authenticated attackers with minimal privileges (Subscriber or higher) to escalate privileges to Administrator on the main WordPress Multisite site. The vulnerability stems from a lack of authorization checks in the group blog settings handler. Specifically, the plugin improperly validates the <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> parameters. This vulnerability allows an attacker to associate their group with the main site (blog ID 1) and automatically assign the &lsquo;administrator&rsquo; role to new group members. Successful exploitation grants attackers full control over the WordPress Multisite network, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a new group on the WordPress Multisite network with a Subscriber account.</li>
<li>Attacker accesses the group&rsquo;s settings page.</li>
<li>Attacker modifies the <code>groupblog-blogid</code> parameter, setting it to &ldquo;1&rdquo; to associate the group with the main site. This is done by crafting a malicious HTTP POST request to the group settings handler.</li>
<li>The attacker modifies the <code>default-member</code> parameter to &ldquo;administrator&rdquo;. This parameter controls the default role assigned to new members.</li>
<li>The attacker enables the <code>groupblog-silent-add</code> parameter. This setting automatically adds new group members to the associated blog (main site) with the specified default role (administrator).</li>
<li>Attacker creates a second user account or convinces another user to join their malicious group.</li>
<li>When the new user joins the attacker&rsquo;s group, the <code>groupblog-silent-add</code> setting automatically adds the new user to the main site with the administrator role.</li>
<li>The attacker (via the new user account) now has administrator access to the main WordPress Multisite site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5144 grants an attacker complete control over the targeted WordPress Multisite network. This allows them to modify content, install malicious plugins, create new administrator accounts, and potentially compromise the underlying server. The impact is especially severe for organizations relying on WordPress Multisite for critical applications, as it can lead to data breaches, service disruptions, and significant financial losses. The vulnerability affects all installations using the BuddyPress Groupblog plugin up to version 1.9.3, potentially impacting thousands of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the BuddyPress Groupblog plugin to a version greater than 1.9.3 to patch CVE-2026-5144.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/options.php</code> with parameters <code>groupblog-blogid</code>, <code>default-member</code>, and <code>groupblog-silent-add</code> to detect potential exploitation attempts, using the provided Sigma rule.</li>
<li>Implement strict access control policies to limit the ability of low-privileged users to modify group settings and install plugins.</li>
<li>Enable logging of user role changes to detect unauthorized privilege escalation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>buddypress</category><category>privilege-escalation</category><category>cve-2026-5144</category><category>cloud</category></item></channel></rss>