CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Lifecycle Timeline
3Description
Cross-Site Request Forgery (CSRF) vulnerability in Jatinder Pal Singh BP Profile as Homepage allows Stored XSS. This issue affects BP Profile as Homepage: from n/a through 1.1.
Analysis
CSRF vulnerability in Jatinder Pal Singh BP Profile as Homepage plugin (versions through 1.1) that enables Stored XSS attacks. An unauthenticated attacker can exploit this via a malicious web request to inject persistent JavaScript into the application, affecting all users who view the compromised profile. The vulnerability requires user interaction (CVSS UI:R) but has cross-site scope impact (S:C), resulting in a 7.1 medium-high severity rating; KEV status and active exploitation data are not currently available in public disclosures.
Technical Context
This vulnerability combines two distinct weaknesses: CWE-352 (Cross-Site Request Forgery) and Stored XSS. The root cause is insufficient CSRF token validation in the BP Profile as Homepage plugin, allowing attackers to craft forged requests that modify user profile data. The Stored XSS component indicates that input validation is also bypassed, permitting JavaScript payloads to be persisted in the profile homepage field. When other users visit the affected profile (AV:N - Network accessible), the malicious script executes in their browsers. The plugin likely runs on WordPress or similar CMS platforms given the naming convention. No specific CPE data was provided, but the affected product is: Jatinder Pal Singh BP Profile as Homepage, versions 1.1 and earlier.
Affected Products
- vendor: Jatinder Pal Singh; product: BP Profile as Homepage; affected_versions: through 1.1; status: Vulnerable
Remediation
1. Update BP Profile as Homepage plugin to version 1.2 or later immediately. 2. If running version 1.1, disable the plugin until patching. 3. Workaround: Implement a Web Application Firewall (WAF) rule to block POST requests to profile modification endpoints lacking valid CSRF tokens. 4. Conduct a site audit to identify and remove any injected JavaScript from user profiles created during the vulnerability window. 5. Implement Content Security Policy (CSP) headers to mitigate XSS impact. 6. Review user profile content for malicious scripts and sanitize stored data. Note: No vendor advisory URL or specific patch version number was provided in the CVE data; consult the official plugin repository or vendor website for patch availability.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17153