Description
BuddyPress Xprofile Custom Fields Type 2.6.3 contains a remote code execution vulnerability that allows authenticated users to delete arbitrary files by manipulating unescaped POST parameters. Attackers can modify the field_hiddenfile and field_deleteimg parameters during profile editing to unlink files from the server.
Published: 2026-04-29
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

BuddyPress Xprofile Custom Fields Type 2.6.3 contains an inconsistency that allows authenticated users to delete arbitrary files by manipulating the unescaped POST parameters field_hiddenfile and field_deleteimg during profile editing operations. This flaw is a classic example of insecure direct object reference (CWE‑22) and provides an attacker with the capability to unlink any file from the server that the application’s process user is allowed to delete. The operation can compromise or remove critical application files, potentially leading to remote code execution or denial of service if essential files are removed.

Affected Systems

The vulnerability impacts the BuddyPress Xprofile Custom Fields Type plugin, version 2.6.3, sold by donmik and deployed on WordPress sites that use the BuddyPress Xprofile extension. No other vendor or product versions are listed in the CNA data, and the flaw appears to be confined to this specific release.

Risk and Exploitability

The CVSS score of 8.7 classifies this as a high‑severity issue. The EPSS score is not available, so a quantitative estimate of exploitation likelihood cannot be provided, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers must be authenticated and possess permissions to edit profile fields, which implies a local or privileged user rather than an anonymous remote attacker. The exploit requires sending a crafted POST request to the profile edit endpoint, so mitigating the vulnerability involves both removing the logic that accepts unvalidated input and restricting the range of users who can perform the edit.

Generated by OpenCVE AI on April 30, 2026 at 13:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BuddyPress Xprofile Custom Fields Type to a patched release that addresses the file deletion flaw; if no patch is available, consider uninstalling or disabling the plugin.
  • Restrict profile editing privileges to administrators or trusted users, and remove the field_hiddenfile and field_deleteimg parameters from the user‑editable form for non‑admin accounts.
  • Implement server‑side validation to ensure that the values for field_hiddenfile and field_deleteimg refer only to allowed file paths, rejecting any attempts to delete files outside the intended scope.

Generated by OpenCVE AI on April 30, 2026 at 13:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Donmik
Donmik buddypress Xprofile Custom Fields Type
Wordpress
Wordpress wordpress
Vendors & Products Donmik
Donmik buddypress Xprofile Custom Fields Type
Wordpress
Wordpress wordpress

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description BuddyPress Xprofile Custom Fields Type 2.6.3 contains a remote code execution vulnerability that allows authenticated users to delete arbitrary files by manipulating unescaped POST parameters. Attackers can modify the field_hiddenfile and field_deleteimg parameters during profile editing to unlink files from the server.
Title BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Donmik Buddypress Xprofile Custom Fields Type
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-30T12:22:03.727Z

Reserved: 2026-04-29T12:15:55.808Z

Link: CVE-2018-25308

cve-icon Vulnrichment

Updated: 2026-04-30T12:22:00.138Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T20:16:26.323

Modified: 2026-04-30T15:44:48.290

Link: CVE-2018-25308

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T14:00:22Z

Weaknesses