{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T07:50:04.060","vulnerabilities":[{"cve":{"id":"CVE-2025-1909","sourceIdentifier":"security@wordfence.com","published":"2025-05-05T20:15:19.127","lastModified":"2025-05-28T20:03:54.720","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email."},{"lang":"es","value":"El complemento BuddyBoss Platform Pro para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 2.7.01 incluida. Esto se debe a una verificación insuficiente del usuario proporcionada durante la solicitud de autenticación OAuth de Apple a través del complemento. Esto permite que atacantes no autenticados inicien sesión como cualquier usuario del sitio, como un administrador, si tienen acceso al correo electrónico."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:pro:wordpress:*:*","versionEndExcluding":"2.7.10","matchCriteriaId":"8B0680CD-BF0C-4225-9746-1D6DBFBB85DE"}]}]}],"references":[{"url":"https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/2-7-10/","source":"security@wordfence.com","tags":["Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7cce9b8b-0589-4b09-b184-a66fc86fcb46?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}