Description
SQL injection vulnerability in wp-load.php in the BuddyPress plugin 1.5.x before 1.5.5 of WordPress allows remote attackers to execute arbitrary SQL commands via the page parameter in an activity_widget_filter action.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Ivan Terkin · textwebappsphp
https://www.exploit-db.com/exploits/18690
References (6)
Core 6
Core References
Patch, Vendor Advisory x_refsource_confirm
http://buddypress.org/2012/03/buddypress-1-5-5/
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18690
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/80763
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/10
Exploit mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/15/2
Exploit mailing-list
x_refsource_bugtraq
http://seclists.org/bugtraq/2012/Apr/4
Scores
EPSS
0.0238
EPSS Percentile
85.2%
Details
CWE
CWE-89
Status
published
Products (6)
buddypress/buddypress
1.5
buddypress/buddypress
1.5.1
buddypress/buddypress
1.5.2
buddypress/buddypress
1.5.3
buddypress/buddypress
1.5.3.1
buddypress/buddypress
1.5.4
Published
Sep 04, 2012
Tracked Since
Feb 18, 2026