Connect with us

Hi, what are you looking for?



Stored XSS Flaw Patched in bbPress WordPress Plugin

A vulnerability in the popular WordPress plugin bbPress can be exploited to insert malicious JavaScript code into forum posts, web security company Sucuri has warned.

A vulnerability in the popular WordPress plugin bbPress can be exploited to insert malicious JavaScript code into forum posts, web security company Sucuri has warned.

bbPress is a forum software plugin maintained by Automattic, the company behind the blogging service. bbPress is currently installed on more than 300,000 WordPress websites and it powers the official support forum.

Researchers at Sucuri discovered that the plugin is plagued by a stored cross-site scripting (XSS) vulnerability that can be easily exploited by a remote attacker to hijack user accounts and perform actions on their behalf.

The flaw is related to bbp_mention_filter, a function that finds users mentioned in a forum post using the @ symbol and links to their profile. The problem, according to experts, is that bbPress doesn’t check if mentions are already located inside an HTML tag’s attribute, which breaks the hyperlink tag and allows an attacker to insert arbitrary event handlers and execute arbitrary JavaScript code.

For example, a user named “test” can break the hyperlink tag by posting a reply containing a tag with the href attribute set to “@test.”

bbPress XSS

Since it’s a stored XSS vulnerability, the malicious code injected by the attacker would get executed whenever the post is viewed by a user.

The vulnerability, which affects bbPress 2.5.8 and earlier, was reported to the bbPress team on April 12 and it was patched on May 2 with the release of version 2.5.9.

“If you’re using any version of bbPress 2.x and have not yet updated, please take a moment to update your bbPress installations to 2.5.9. If you’re using WordPress’s built-in updater, it should only take a click or two,” bbPress lead developer John James Jacoby said in a blog post.

Advertisement. Scroll to continue reading.

According to Sucuri, the vulnerability was similar to one found last year in Akismet, an anti-spam plugin created by Automattic.

Related: WordPress 4.4.2 Patches Open Redirect, SSRF Flaws

Related: Backdoor in WordPress Plugin Steals Admin Credentials

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Satellite cybersecurity company SpiderOak has named Kip Gering as its new Chief Revenue Officer.

Merlin Ventures has appointed cybersecurity executive Andrew Smeaton as the firm’s CISO-in-Residence.

Retired U.S. Army General and former NSA Director Paul M. Nakasone has joined the Board of Directors at OpenAI.

More People On The Move

Expert Insights