CVE-2025-14156
Unknown Unknown - Not Provided
Privilege Escalation in Fox LMS Plugin Allows Admin Account Creation

Publication date: 2025-12-15

Last updated on: 2025-12-15

Assigner: Wordfence

Description
The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2025-12-15
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
fox_lms fox_lms 1.0.5.2
fox_lms fox_lms 1.0.5.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Fox LMS WordPress plugin allows unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, by exploiting improper validation of the 'role' parameter in the /fox-lms/v1/payments/create-order REST API endpoint. This privilege escalation flaw can lead to complete site compromise. [2]


How can this vulnerability impact me? :

This vulnerability can lead to complete site compromise because attackers can create user accounts with elevated privileges such as administrator without authentication. This means attackers could take full control of the WordPress site, potentially modifying content, stealing data, or disrupting services. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if your WordPress site is running the Fox LMS plugin version 1.0.5.1 or earlier. Additionally, monitoring HTTP requests to the REST API endpoint `/fox-lms/v1/payments/create-order` for attempts to create users with arbitrary roles can help detect exploitation attempts. For example, you can use command-line tools like curl to test the endpoint or inspect logs for suspicious POST requests containing the 'role' parameter with elevated roles such as 'administrator'. Example command to test the endpoint: `curl -X POST https://your-site.com/wp-json/fox-lms/v1/payments/create-order -d 'role=administrator&other_params=...'` (replace with actual parameters). Also, reviewing user accounts created recently for unexpected roles can help detect exploitation. [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Fox LMS WordPress plugin to version 1.0.5.2 or later, which includes a patch that hardcodes the user role to 'subscriber' during user creation via the vulnerable REST API endpoint, preventing privilege escalation. Until the update is applied, restrict access to the `/fox-lms/v1/payments/create-order` REST API endpoint if possible, and monitor for suspicious activity. Additionally, review and remove any unauthorized administrator accounts that may have been created. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart