CVE-2026-32530
Received Received - Intake
Privilege Escalation via Incorrect Privilege Assignment in Creator LMS

Publication date: 2026-03-25

Last updated on: 2026-03-26

Assigner: Patchstack

Description
Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms allows Privilege Escalation.This issue affects Creator LMS: from n/a through <= 1.1.18.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wpfunnels creator_lms to 1.1.18 (inc)
patchstack creator_lms to 1.1.18 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The privilege escalation vulnerability in the Creator LMS Plugin (CVE-2026-32530) allows attackers to gain elevated privileges and potentially full control over the affected website. Such unauthorized access and control can lead to exposure or manipulation of sensitive data, which may impact compliance with data protection standards and regulations like GDPR and HIPAA that require strict access controls and protection of personal and health information.

Failure to address this vulnerability could result in violations of these regulations due to inadequate privilege management and potential data breaches, thereby increasing legal and financial risks for organizations using the affected plugin.


Can you explain this vulnerability to me?

CVE-2026-32530 is a privilege escalation vulnerability in the WordPress Creator LMS Plugin versions up to 1.1.18.

This vulnerability allows an attacker who has low-level privileges, such as a Contributor or Developer role, to escalate their privileges to higher levels.

By exploiting this flaw, the attacker can potentially gain full control over the affected website.

The issue is classified under the OWASP Top 10 category A7: Identification and Authentication Failures and has a CVSS severity score of 8.8, indicating a moderately dangerous flaw.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker with initially low-level access to escalate their privileges to higher levels.

This escalation can lead to the attacker gaining full control over the affected website.

Such control can result in unauthorized changes, data breaches, or other malicious activities on your website.

Because the vulnerability is moderately severe and likely to be exploited in mass campaigns, it poses a significant risk to website security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the WordPress Creator LMS Plugin versions up to 1.1.18 and allows privilege escalation from low-level roles. Detection involves identifying if the vulnerable plugin version is installed and monitoring for suspicious privilege escalation attempts.

  • Check the installed version of the Creator LMS plugin in your WordPress installation to see if it is version 1.1.18 or earlier.
  • Use WordPress CLI commands such as `wp plugin list` to verify the plugin version.
  • Monitor user role changes or privilege escalations in WordPress logs or audit trails to detect suspicious activity.
  • Apply network monitoring to detect exploitation attempts targeting this vulnerability, possibly using Patchstack mitigation rules if available.

What immediate steps should I take to mitigate this vulnerability?

The primary and most effective mitigation step is to update the Creator LMS WordPress plugin to version 1.1.19 or later, which contains the fix for this privilege escalation vulnerability.

  • Immediately update the Creator LMS plugin to version 1.1.19 or newer.
  • If immediate update is not possible, apply Patchstack's mitigation rules to block attacks targeting this vulnerability.
  • Enable any automatic mitigation or auto-update features provided by Patchstack to enhance protection until the plugin is updated.
  • Review user roles and permissions to ensure no unauthorized privilege escalations have occurred.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart