Etavrian
keyboard_arrow_right Created with Sketch.
News
keyboard_arrow_right Created with Sketch.

Popular BuddyPress Plugin Hit by High Severity Flaw - Is Your Site Exposed?

Reviewed:
Andrii Daniv
2
min read
Jan 23, 2026
Minimalist website security illustration showing unauthorized code detection warning funnel patched shield report

A high severity security flaw has been disclosed in the BuddyPress WordPress plugin, widely used on community and membership websites. The issue allows unauthenticated arbitrary shortcode execution on vulnerable sites and has been fixed in a recent plugin release.

BuddyPress WordPress Vulnerability May Impact Up To 100,000 Sites
BuddyPress shortcode vulnerability may affect more than 100,000 WordPress sites.

BuddyPress WordPress vulnerability details

BuddyPress is installed on more than 100,000 WordPress websites, based on the plugin's official statistics. Wordfence Threat Intelligence has documented a vulnerability affecting all BuddyPress versions up to and including 14.3.3.

The flaw allows unauthenticated visitors to trigger arbitrary WordPress shortcodes through a BuddyPress action exposed on affected sites. It carries a CVSS score of 7.3 and is classified as high severity in the Wordfence advisory.

  • Affected product: BuddyPress plugin for WordPress.
  • Affected versions: all releases up to and including 14.3.3.
  • Vulnerability type: unauthenticated arbitrary shortcode execution.
  • Authentication required: none to trigger the affected shortcode functionality.
  • Technical cause: missing validation of a user-supplied value before execution via the WordPress do_shortcode function.
  • Installation base: more than 100,000 active sites as reported for the plugin.
  • Configuration dependencies: the vulnerability does not rely on special server settings or optional configurations.

Background on the BuddyPress plugin

BuddyPress extends WordPress with social networking features, including user profiles, activity streams, private messaging, and groups. It is commonly used on membership and community sites that embed interactive user functionality within WordPress.

Public vulnerability tracking in 2025 recorded one BuddyPress security issue before this latest disclosure. That earlier issue carried a score of 5.3 on a 1-10 scale and was categorized as medium severity.

Official advisories and patch status

In its advisory, Wordfence described the BuddyPress flaw as an arbitrary shortcode execution vulnerability affecting versions through 14.3.3. The notice appears in the Wordfence Threat Intelligence database of WordPress plugin issues.

The advisory explains that an action in BuddyPress fails to validate a user-controlled value before calling WordPress's do_shortcode function. This behavior lets unauthenticated users trigger arbitrary shortcode execution on affected sites.

The issue has been addressed in BuddyPress version 14.3.4, which includes a fix for the shortcode validation problem. Details of the vulnerability and remediation steps are described in the Wordfence advisory.

Quickly summarize and get insighs with: 
Author
Etavrian AI
Etavrian AI is developed by Andrii Daniv to produce and optimize content for etavrian.com website.
Reviewed
Andrew Daniv, Andrii Daniv
Andrii Daniv
Andrii Daniv is the founder and owner of Etavrian, a performance-driven agency specializing in PPC and SEO services for B2B and e‑commerce businesses.
Quickly summarize and get insighs with: 
Table of contents