VYPR
Medium severity5.4NVD Advisory· Published Jan 27, 2025· Updated Apr 23, 2026

CVE-2025-24538

CVE-2025-24538

Description

Cross-Site Request Forgery (CSRF) vulnerability in Slava Abakumov BuddyPress Groups Extras buddypress-groups-extras allows Cross Site Request Forgery.This issue affects BuddyPress Groups Extras: from n/a through <= 3.6.10.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in BuddyPress Groups Extras plugin ≤3.6.10 allows attackers to force privileged users into executing unwanted actions.

Overview

CVE-2025-24538 is a Cross-Site Request Forgery (CSRF) vulnerability found in the WordPress plugin BuddyPress Groups Extras, developed by Slava Abakumov. The issue affects all versions from n/a through 3.6.10 [1]. CSRF flaws occur when a web application fails to validate the origin of authenticated requests, enabling an attacker to trick a logged-in user into performing unintended actions.

Exploitation

To exploit this vulnerability, an attacker must persuade a higher-privileged user (such as an administrator) to interact with a crafted link, visit a specially designed page, or submit a malicious form while they are authenticated to the WordPress site [1]. No additional privileges on the target site are needed beyond the victim's current session. The attack does not require any special network position — it can be launched from any externally hosted page or email. User interaction is required, as the victim must perform the action that triggers the forged request.

Impact

Successful exploitation allows the attacker to force the victim's browser to execute arbitrary actions on the BuddyPress Groups Extras plugin, under the victim's authenticated session [1]. This could lead to unauthorized changes to group extras, configuration tampering, or other administrative operations. The CVSS v3 base score is 5.4 (Medium), indicating a moderate severity due to the requirement for user interaction and the limited scope of impact.

Mitigation

The vulnerability is remediated in version 3.7.0 of the plugin [1]. Users are strongly advised to update to this version or later. Patchstack users can enable auto-updates for vulnerable plugins. The vendor considers this a low-severity issue unlikely to be widely exploited, but prompt patching is recommended to maintain site security.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.