CVE-2025-13964
Unknown Unknown - Not Provided
Unauthorized Data Modification in LearnPress Plugin via Missing Capability Check

Publication date: 2026-01-06

Last updated on: 2026-01-06

Assigner: Wordfence

Description
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the catch_lp_ajax function in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to modify course contents by adding/removing/updating/re-ordering sections or modifying section items.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-06
Last Modified
2026-01-06
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thimpress learnpress to 4.3.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the LearnPress WordPress LMS plugin (up to version 4.3.2) is due to a missing capability check in the catch_lp_ajax function. It allows unauthenticated attackers to modify course content by adding, removing, updating, or reordering course sections and their items. The root cause is that certain AJAX requests bypass nonce verification by relying on the referer header for validation, which can be spoofed, enabling unauthorized AJAX actions that modify course data. [1, 3]


How can this vulnerability impact me? :

This vulnerability can allow an unauthenticated attacker to modify course contents in your LearnPress plugin. They could add, remove, update, or reorder course sections and items without permission, potentially disrupting course structure, content integrity, and user experience. This unauthorized modification could lead to misinformation, loss of trust, or damage to your educational platform's reputation. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring AJAX requests to the LearnPress plugin's catch_lp_ajax function, specifically looking for unauthorized or unauthenticated requests that modify course content. Since the vulnerability involves missing capability checks and nonce verification bypasses, you can inspect HTTP requests targeting LearnPress AJAX endpoints for suspicious parameters such as 'lp-load-ajax' and actions related to course section modifications. Commands to detect such activity could include using network monitoring tools like tcpdump or Wireshark to filter HTTP POST requests to the WordPress AJAX handler (usually admin-ajax.php) with parameters related to LearnPress. For example, using tcpdump: tcpdump -i any -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'lp-load-ajax' or using curl to test unauthorized AJAX calls to LearnPress endpoints and check for unexpected success responses. Additionally, reviewing web server logs for POST requests to admin-ajax.php with LearnPress-related parameters and no valid nonce or referer headers can help detect exploitation attempts. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the LearnPress plugin to a version later than 4.3.2 where the vulnerability is fixed. If an update is not immediately possible, restrict access to the AJAX endpoints used by LearnPress by implementing firewall rules or web application firewall (WAF) rules to block unauthenticated requests attempting to modify course content. Additionally, review and harden nonce verification and referer checks in the plugin's AJAX handling code to ensure proper capability checks are enforced. Monitoring and alerting on suspicious AJAX requests targeting LearnPress can also help mitigate exploitation. Finally, consider temporarily disabling the LearnPress plugin if the risk is high and no patch is available. [1, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to modify course content without authorization, which could lead to unauthorized data manipulation. This unauthorized modification risk may impact compliance with standards and regulations such as GDPR and HIPAA, which require protection of data integrity and prevention of unauthorized access or changes to sensitive information. However, specific impacts on compliance depend on the nature of the data handled by the LearnPress plugin and the organization's use case. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart