CVE-2024-7850: CWE-352 Cross-Site Request Forgery (CSRF) in dontdream BP Profile Search
CVE-2024-7850 is a Cross-Site Request Forgery (CSRF) vulnerability in the BP Profile Search WordPress plugin versions up to 5. 7. 5. The flaw arises from missing or incorrect nonce validation in several AJAX handler functions, allowing unauthenticated attackers to craft malicious requests. If a site administrator is tricked into clicking a malicious link, these forged requests can execute unintended actions, potentially injecting malicious scripts. The vulnerability impacts confidentiality and integrity but does not affect availability. It requires user interaction but no authentication, and the scope includes all affected plugin versions. No known exploits are currently reported in the wild. The CVSS score is 6. 1 (medium severity).
AI Analysis
Technical Summary
The BP Profile Search plugin for WordPress, widely used to enhance BuddyPress profile search capabilities, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-7850. This vulnerability exists in all versions up to and including 5.7.5 due to missing or incorrect nonce validation in three AJAX handler functions: bps_ajax_field_selector(), bps_ajax_template_options(), and bps_ajax_field_row(). Nonce validation is a critical security mechanism in WordPress to ensure that requests originate from legitimate users and not from malicious third-party sites. The absence or improper implementation of nonce checks allows attackers to craft malicious web requests that, when executed by an authenticated site administrator (via clicking a crafted link or visiting a malicious page), can perform unauthorized actions on the site. These actions may include injecting malicious scripts or modifying plugin settings, thereby compromising the confidentiality and integrity of site data. The vulnerability does not require the attacker to be authenticated, but it does require user interaction from an administrator, which limits automated exploitation. The CVSS 3.1 base score of 6.1 reflects a medium severity rating, with attack vector as network, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable code. No public exploits have been reported yet, but the vulnerability poses a risk to sites using the affected plugin versions, especially those with high-privilege users.
Potential Impact
Organizations using the BP Profile Search plugin on WordPress sites are at risk of unauthorized actions performed by attackers via CSRF attacks. The primary impact is on confidentiality and integrity, as attackers can potentially inject malicious scripts or alter plugin configurations without direct authentication. This could lead to data leakage, unauthorized data modification, or further compromise through chained attacks such as privilege escalation or persistent cross-site scripting (XSS). Although availability is not directly impacted, the trustworthiness of the affected sites can be undermined, potentially damaging organizational reputation. The requirement for an administrator to interact with a malicious link reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. This vulnerability is particularly concerning for organizations with sensitive user data or those relying heavily on BuddyPress communities, as compromised profiles or search functionalities could facilitate broader attacks or data exposure.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the BP Profile Search plugin to a version that addresses the nonce validation issues once available. Until a patch is released, administrators should minimize exposure by restricting administrative access, employing strong phishing awareness training to reduce the risk of social engineering, and using web application firewalls (WAFs) to detect and block suspicious CSRF attempts. Implementing Content Security Policy (CSP) headers can help limit the impact of injected scripts. Additionally, site owners can manually review and harden AJAX handler functions by adding proper nonce verification to prevent unauthorized requests. Monitoring administrative activity logs for unusual behavior and enforcing multi-factor authentication (MFA) for admin accounts can further reduce risk. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Netherlands, India, Brazil, Japan
CVE-2024-7850: CWE-352 Cross-Site Request Forgery (CSRF) in dontdream BP Profile Search
Description
CVE-2024-7850 is a Cross-Site Request Forgery (CSRF) vulnerability in the BP Profile Search WordPress plugin versions up to 5. 7. 5. The flaw arises from missing or incorrect nonce validation in several AJAX handler functions, allowing unauthenticated attackers to craft malicious requests. If a site administrator is tricked into clicking a malicious link, these forged requests can execute unintended actions, potentially injecting malicious scripts. The vulnerability impacts confidentiality and integrity but does not affect availability. It requires user interaction but no authentication, and the scope includes all affected plugin versions. No known exploits are currently reported in the wild. The CVSS score is 6. 1 (medium severity).
AI-Powered Analysis
Technical Analysis
The BP Profile Search plugin for WordPress, widely used to enhance BuddyPress profile search capabilities, suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2024-7850. This vulnerability exists in all versions up to and including 5.7.5 due to missing or incorrect nonce validation in three AJAX handler functions: bps_ajax_field_selector(), bps_ajax_template_options(), and bps_ajax_field_row(). Nonce validation is a critical security mechanism in WordPress to ensure that requests originate from legitimate users and not from malicious third-party sites. The absence or improper implementation of nonce checks allows attackers to craft malicious web requests that, when executed by an authenticated site administrator (via clicking a crafted link or visiting a malicious page), can perform unauthorized actions on the site. These actions may include injecting malicious scripts or modifying plugin settings, thereby compromising the confidentiality and integrity of site data. The vulnerability does not require the attacker to be authenticated, but it does require user interaction from an administrator, which limits automated exploitation. The CVSS 3.1 base score of 6.1 reflects a medium severity rating, with attack vector as network, low attack complexity, no privileges required, user interaction required, and a scope change indicating that the vulnerability affects components beyond the initially vulnerable code. No public exploits have been reported yet, but the vulnerability poses a risk to sites using the affected plugin versions, especially those with high-privilege users.
Potential Impact
Organizations using the BP Profile Search plugin on WordPress sites are at risk of unauthorized actions performed by attackers via CSRF attacks. The primary impact is on confidentiality and integrity, as attackers can potentially inject malicious scripts or alter plugin configurations without direct authentication. This could lead to data leakage, unauthorized data modification, or further compromise through chained attacks such as privilege escalation or persistent cross-site scripting (XSS). Although availability is not directly impacted, the trustworthiness of the affected sites can be undermined, potentially damaging organizational reputation. The requirement for an administrator to interact with a malicious link reduces the likelihood of widespread automated exploitation but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. This vulnerability is particularly concerning for organizations with sensitive user data or those relying heavily on BuddyPress communities, as compromised profiles or search functionalities could facilitate broader attacks or data exposure.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the BP Profile Search plugin to a version that addresses the nonce validation issues once available. Until a patch is released, administrators should minimize exposure by restricting administrative access, employing strong phishing awareness training to reduce the risk of social engineering, and using web application firewalls (WAFs) to detect and block suspicious CSRF attempts. Implementing Content Security Policy (CSP) headers can help limit the impact of injected scripts. Additionally, site owners can manually review and harden AJAX handler functions by adding proper nonce verification to prevent unauthorized requests. Monitoring administrative activity logs for unusual behavior and enforcing multi-factor authentication (MFA) for admin accounts can further reduce risk. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-15T16:03:32.159Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c20b7ef31ef0b56034a
Added to database: 2/25/2026, 9:39:44 PM
Last enriched: 2/26/2026, 3:49:19 AM
Last updated: 2/26/2026, 8:05:47 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.