Impact
The bbPress plugin suffers a Cross-Site Request Forgery flaw caused by missing nonce validation in the bbp_user_add_role_on_register() function. Unauthenticated attackers can craft a request that, when an authorized site administrator clicks a link, elevates the admin's privileges to that of a bbPress Keymaster. This type of privilege escalation allows control over the forum and potentially broader site administration functions. The weakness is classified as CWE-352 and carries a CVSS score of 6.3.
Affected Systems
johnjamesjacoby:bbPress – the bbPress plugin for WordPress. All releases up to and including version 2.6.11 are affected. Any installation using these versions without remediation is at risk.
Risk and Exploitability
With a CVSS score of 6.3 the vulnerability is considered moderate. The EPSS score of < 1% indicates a very low current exploitation probability. The attack requires social engineering: an attacker must persuade a logged‑in administrator to click a forged link or otherwise submit the request. Though exploitation is not automatic, successfully achieved, the attacker gains high-level forum permissions, making the risk significant. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
EUVD