CVE-2025-14064
Description
The BuddyTask plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on multiple AJAX endpoints in all versions up to, and including, 1.3.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view, create, modify, and delete task boards belonging to any BuddyPress group, including private and hidden groups they are not members of.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Missing capability checks on multiple AJAX endpoints in the BuddyTask WordPress plugin allow subscribers to view, create, modify, and delete task boards belonging to any BuddyPress group.
The BuddyTask plugin for WordPress contains a Missing Authorization vulnerability across multiple AJAX endpoints. This is a class-level weakness (CWE-862) where the software does not perform an authorization check when an actor attempts to access a resource or perform an action [1]. In versions up to and including 1.3.0, the plugin fails to verify that the user has the necessary capabilities before handling AJAX requests for task board operations.
An authenticated attacker with Subscriber-level access or above can exploit these endpoints. The vulnerability allows the attacker to interact with task boards belonging to any BuddyPress group, including private and hidden groups that the attacker is not a member of. No additional privileges or special network access are required beyond having a valid account on the WordPress site.
Successful exploitation enables the attacker to view, create, modify, and delete task boards associated with any group on the site. This compromises the integrity and confidentiality of task management data, potentially exposing sensitive information contained in private or hidden group boards.
As of the publication date, the vendor has not released a patched version, and users are advised to update when available or restrict access to the plugin until a fix is deployed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.3.0+ 1 more
- (no CPE)range: <=1.3.0
- (no CPE)range: <=1.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- cwe.mitre.org/data/definitions/862.htmlnvd
- plugins.trac.wordpress.org/browser/buddytask/tags/1.3.0/buddytask.phpnvd
- plugins.trac.wordpress.org/browser/buddytask/trunk/buddytask.phpnvd
- plugins.trac.wordpress.org/browser/buddytask/trunk/buddytask.phpnvd
- plugins.trac.wordpress.org/browser/buddytask/trunk/buddytask.phpnvd
- plugins.trac.wordpress.org/browser/buddytask/trunk/buddytask.phpnvd
- plugins.trac.wordpress.org/changeset/3416754/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/0dfe0947-5790-49ba-aa3d-6bc61c12b355nvd
News mentions
0No linked articles in our index yet.