BuddyPress 6.0.0 Release Candidate 2 for WordPress

CPE Details

BuddyPress 6.0.0 Release Candidate 2 for WordPress
6.0.0
2021-03-30
12h45 +00:00
2021-03-31
11h55 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:buddypress:buddypress:6.0.0:rc2:*:*:*:wordpress:*:*

Informations

Vendor

buddypress

Product

buddypress

Version

6.0.0

Update

rc2

Target Software

wordpress

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-10011 2024-10-25 06h51 +00:00 The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
8.1
High
CVE-2023-50880 2023-12-29 11h28 +00:00 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.
6.5
Medium
CVE-2021-21389 2021-03-26 19h15 +00:00 BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
8.8
High