CVE-2025-14156
Privilege Escalation in Fox LMS Plugin Allows Admin Account Creation
Publication date: 2025-12-15
Last updated on: 2025-12-15
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fox_lms | fox_lms | 1.0.5.2 |
| fox_lms | fox_lms | 1.0.5.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Fox LMS WordPress plugin allows unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, by exploiting improper validation of the 'role' parameter in the /fox-lms/v1/payments/create-order REST API endpoint. This privilege escalation flaw can lead to complete site compromise. [2]
How can this vulnerability impact me? :
This vulnerability can lead to complete site compromise because attackers can create user accounts with elevated privileges such as administrator without authentication. This means attackers could take full control of the WordPress site, potentially modifying content, stealing data, or disrupting services. [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking if your WordPress site is running the Fox LMS plugin version 1.0.5.1 or earlier. Additionally, monitoring HTTP requests to the REST API endpoint `/fox-lms/v1/payments/create-order` for attempts to create users with arbitrary roles can help detect exploitation attempts. For example, you can use command-line tools like curl to test the endpoint or inspect logs for suspicious POST requests containing the 'role' parameter with elevated roles such as 'administrator'. Example command to test the endpoint: `curl -X POST https://your-site.com/wp-json/fox-lms/v1/payments/create-order -d 'role=administrator&other_params=...'` (replace with actual parameters). Also, reviewing user accounts created recently for unexpected roles can help detect exploitation. [2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Fox LMS WordPress plugin to version 1.0.5.2 or later, which includes a patch that hardcodes the user role to 'subscriber' during user creation via the vulnerable REST API endpoint, preventing privilege escalation. Until the update is applied, restrict access to the `/fox-lms/v1/payments/create-order` REST API endpoint if possible, and monitor for suspicious activity. Additionally, review and remove any unauthorized administrator accounts that may have been created. [2]