id: CVE-2021-21389 info: name: BuddyPress REST API <7.2.1 - Privilege Escalation/Remote Code Execution author: lotusdll severity: high description: WordPress BuddyPress before version 7.2.1 is susceptible to a privilege escalation vulnerability that can be leveraged to perform remote code execution. remediation: This issue has been remediated in WordPress BuddyPress 7.2.1. reference: - https://github.com/HoangKien1020/CVE-2021-21389 - https://buddypress.org/2021/03/buddypress-7-2-1-security-release/ - https://codex.buddypress.org/releases/version-7-2-1/ - https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3 - https://nvd.nist.gov/vuln/detail/CVE-2021-21389 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-21389 cwe-id: CWE-863 epss-score: 0.76628 epss-percentile: 0.97843 cpe: cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: buddypress product: buddypress framework: wordpress tags: cve,cve2021,wordpress,wp-plugin,rce,wp,buddypress http: - raw: - | POST /wp-json/buddypress/v1/signup HTTP/1.1 Host: {{Hostname}} Content-Type: application/json; charset=UTF-8 { "user_login":"{{randstr}}", "password":"{{randstr}}", "user_name":"{{randstr}}", "user_email":"{{randstr}}@interact.sh" } matchers-condition: and matchers: - type: word part: body words: - "user_login" - "registered" - "activation_key" - "user_email" condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4a0a00473045022100b4dbe6cd9a508c56e437b6ec11010b87a5e0962aec82ed9bb3b9c0a98b259b8d02207ea7040cac54eb63852a234891b7cae68d99ecc399b01d06883e57a77e76b42a:922c64590222798bb761d5b6d8e72950