Vulnerability Description
In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Buddypress | Buddypress | >= 5.0.0, < 5.1.2 |
Related Weaknesses (CWE)
References
- https://buddypress.org/2020/01/buddypress-5-1-2/Release NotesVendor Advisory
- https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4aPatchThird Party Advisory
- https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gvThird Party Advisory
- https://buddypress.org/2020/01/buddypress-5-1-2/Release NotesVendor Advisory
- https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4aPatchThird Party Advisory
- https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gvThird Party Advisory
FAQ
What is CVE-2020-5244?
CVE-2020-5244 is a vulnerability with a CVSS score of 8.0 (HIGH). In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed. This has been patched in version 5.1.2.
How severe is CVE-2020-5244?
CVE-2020-5244 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-5244?
Check the references section above for vendor advisories and patch information. Affected products include: Buddypress Buddypress.