Impact
An attacker with moderator privileges can inject malicious scripts through the figure parameter in wp:html blocks of the BuddyPress plugin. The injected payload may include iframe elements with event handlers such as onload that execute automatically when administrators or other privileged users preview or view the affected content, allowing session hijacking and persistent phishing attacks. The vulnerability is a classic input validation flaw classified as CWE‑79.
Affected Systems
WordPress sites that use the BuddyPress plugin version 6.2.0 are affected. The plugin must be installed on a WordPress CMS with at least one moderator account to reach the vulnerable interface.
Risk and Exploitability
The CVSS score of 5.1 classifies the issue as moderate. EPSS information is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. Exploitation requires an authenticated moderator account and the presence of editable wp:html blocks, making the attack vector a credential‑based client‑side XSS that primarily threatens the confidentiality and integrity of privileged sessions.
OpenCVE Enrichment