id: CVE-2021-21389 info: name: BuddyPress REST API <7.2.1 - Privilege Escalation/Remote Code Execution author: lotusdll severity: high description: WordPress BuddyPress before version 7.2.1 is susceptible to a privilege escalation vulnerability that can be leveraged to perform remote code execution. impact: | Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information, escalate privileges, or execute arbitrary code on the affected system. remediation: This issue has been remediated in WordPress BuddyPress 7.2.1. reference: - https://github.com/HoangKien1020/CVE-2021-21389 - https://buddypress.org/2021/03/buddypress-7-2-1-security-release/ - https://codex.buddypress.org/releases/version-7-2-1/ - https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3 - https://nvd.nist.gov/vuln/detail/CVE-2021-21389 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2021-21389 cwe-id: CWE-863 epss-score: 0.83143 epss-percentile: 0.98347 cpe: cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: buddypress product: buddypress framework: wordpress tags: cve2021,cve,wordpress,wp-plugin,rce,wp,buddypress http: - raw: - | POST /wp-json/buddypress/v1/signup HTTP/1.1 Host: {{Hostname}} Content-Type: application/json; charset=UTF-8 { "user_login":"{{randstr}}", "password":"{{randstr}}", "user_name":"{{randstr}}", "user_email":"{{randstr}}@interact.sh" } matchers-condition: and matchers: - type: word part: body words: - "user_login" - "registered" - "activation_key" - "user_email" condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4b0a00483046022100b0e1b8d49d9fe1a59d88506d5d75e0740c560db375170a3e174b0f722115311a022100fc37abd7b4479a1a735a9447124a0e20493872640be3cca1318a98db23cb9662:922c64590222798bb761d5b6d8e72950