Description
The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Published: 2025-05-05
Score: 9.8 Critical
EPSS: 1.0% Low
KEV: No
Impact: Authentication bypass that allows an attacker to log in as any existing user on the site, including administrators, by supplying a valid email address in an Apple OAuth request
Action: Immediate Patch
AI Analysis

Impact

This vulnerability exists in the BuddyBoss Platform Pro plugin for WordPress up to and including version 2.7.01. An unauthenticated attacker can take advantage of insufficient verification of the user supplied during the Apple OAuth authentication flow. By providing a valid email address belonging to an existing user, the plugin incorrectly trusts the request and logs the attacker in as that user. The compromised account gains the full permissions of the impersonated account, potentially allowing complete control over the site.

Affected Systems

BuddyBoss Platform Pro, a plugin for WordPress, is affected. All installations using version 2.7.01 or earlier are vulnerable. Versions released after 2.7.01 are not impacted.

Risk and Exploitability

The CVSS score of 9.8 highlights critical severity, and an EPSS score of 1% indicates that, while exploitation is likely not widespread yet, the vulnerability is still a high‑risk target for motivated attackers. This issue is not listed in the CISA KEV catalog, but the authentication bypass allows remote attackers to achieve full site compromise. The likely attack vector involves an attacker triggering the Apple OAuth authentication process with a crafted request that includes the target user’s email address.

Generated by OpenCVE AI on April 21, 2026 at 20:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade BuddyBoss Platform Pro to version 2.7.10 or later, which removes the deficient Apple OAuth verification logic
  • If an upgrade is not immediately possible, disable Apple OAuth authentication on the WordPress site until the plugin is updated
  • After remediation, verify that no other OAuth or authentication plugins are misconfigured to allow identity spoofing

Generated by OpenCVE AI on April 21, 2026 at 20:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13435 The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00474}

epss

{'score': 0.00502}


Wed, 28 May 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Buddyboss
Buddyboss buddyboss Platform
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:pro:wordpress:*:*
Vendors & Products Buddyboss
Buddyboss buddyboss Platform

Tue, 06 May 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 05 May 2025 19:45:00 +0000

Type Values Removed Values Added
Description The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Title BuddyBoss Platform Pro <= 2.7.01 - Authentication Bypass via Apple OAuth provider
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Buddyboss Buddyboss Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:46.314Z

Reserved: 2025-03-03T20:30:59.037Z

Link: CVE-2025-1909

cve-icon Vulnrichment

Updated: 2025-05-05T20:01:07.291Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-05T20:15:19.127

Modified: 2025-05-28T20:03:54.720

Link: CVE-2025-1909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:00:36Z

Weaknesses