CVE-2025-11923
BaseFortify
Publication date: 2025-11-13
Last updated on: 2025-11-13
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lifterlms | lifterlms | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the LifterLMS WordPress plugin, where it improperly validates a user's identity before allowing role modifications via the REST API. Specifically, the permission check in the update_item_permissions_check() function incorrectly returns true when a user updates their own account without verifying changes to their role. This flaw allows authenticated users with student-level access or higher to escalate their privileges to administrator by crafting a REST API request that modifies their own roles array.
How can this vulnerability impact me? :
An attacker who exploits this vulnerability can escalate their privileges from a low-level user (such as a student) to an administrator. This means they could gain full control over the WordPress site using the LifterLMS plugin, potentially allowing them to modify content, access sensitive data, change settings, or install malicious code, severely compromising the security and integrity of the site.