๐Ÿ” CVE Alert

CVE-2026-5144

HIGH 8.8

BuddyPress Groupblog <= 1.9.3 - Authenticated (Subscriber+) Privilege Escalation to Administrator via Group Blog IDOR

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
15th

The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers who create their own group) to associate their group with any blog on the Multisite network, including the main site (blog ID 1). The `default-member` parameter accepts any WordPress role, including `administrator`, without validation against a whitelist. When combined with `groupblog-silent-add`, any user who joins the attacker's group is automatically added to the targeted blog with the injected role. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate any user (including themselves via a second account) to Administrator on the main site of the Multisite network.

CWE CWE-269
Vendor boonebgorges
Product buddypress groupblog
Published Apr 11, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for boonebgorges buddypress groupblog

Be the first to know when new high vulnerabilities affecting boonebgorges buddypress groupblog are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

boonebgorges / BuddyPress Groupblog
0 โ‰ค 1.9.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/8129046a-5aa5-4644-babc-0eca9aa524d2?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php#L450 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php#L450 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php#L190 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php#L190 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/trunk/bp-groupblog.php#L220 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/bp-groupblog/tags/1.9.3/bp-groupblog.php#L220 github.com: https://github.com/boonebgorges/bp-groupblog/commit/b824593add9e2c53ef4f0d2e0824d4de0785411f

Credits

Nabil Irawan