Loading HuntDB...

[BuddyPress 2.9.1] Open Redirect via "wp_http_referer" parameter on "bp-profile-edit" endpoint

Low
W
WordPress
Submitted None
Reported by ysx

Vulnerability Details

Technical details and impact analysis

Open Redirect
Hi, In a similar manner to #228569, it is currently possible to execute authenticated open redirections via the `wp_http_referer` parameter used in the [BuddyPress](https://wordpress.org/plugins/buddypress/) extended user edit screen. ## Proof of concept Upon accessing the below URL, please select the "Update Profile" button, then select the "**←Back to Users**" link. This will redirect a target to the attacker-specified address (in this case, "google.com"). ``` http://instance/wp-admin/users.php?page=bp-profile-edit&wp_http_referer=https://google.com ``` ### Supporting evidence {F229538} Thanks, Yasin

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Open Redirect