CVE-2026-4484
Received Received - Intake
Privilege Escalation in Masteriyo LMS Plugin Allows Admin Access

Publication date: 2026-03-26

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an administrator.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
masteriyo learning_management_system to 2.1.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can have a severe impact because it allows an attacker with low-level access (Student-level) to escalate their privileges to administrator. This means the attacker could gain full control over the WordPress site, including managing users, changing site settings, installing or deleting plugins, and accessing sensitive data.


Can you explain this vulnerability to me?

The Masteriyo LMS plugin for WordPress has a vulnerability in all versions up to and including 2.1.6 that allows privilege escalation. This occurs because the plugin's 'InstructorsController::prepare_object_for_database' function permits users to update their user roles. As a result, authenticated users with Student-level access or higher can elevate their privileges to administrator level.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized privilege escalation through the Masteriyo LMS WordPress plugin REST API, specifically by updating user roles via the InstructorsController. Detection involves monitoring REST API requests to the endpoint related to instructor user updates.

You can detect attempts to exploit this vulnerability by checking for REST API calls to the route base 'users/instructors' under the namespace 'masteriyo/v1' that include role changes from users without administrator privileges.

Suggested commands to detect suspicious activity include:

  • Using web server logs (e.g., Apache or Nginx) to search for POST or PUT requests to the REST API endpoint: grep -i 'wp-json/masteriyo/v1/users/instructors' /var/log/apache2/access.log
  • Checking for REST API requests that include the 'roles' parameter in the request body, which could indicate attempts to change user roles.
  • Using WordPress debug or audit logs (if enabled) to track user role changes or REST API permission errors.
  • Monitoring for unexpected changes in user roles, especially elevation from Student-level to Administrator.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to update the Masteriyo LMS plugin to version 2.1.7 or later, where the vulnerability has been fixed by enforcing permission checks on role changes in the REST API.

If immediate update is not possible, restrict access to the REST API endpoints related to instructor user management to trusted users only.

Additionally, review and limit user capabilities to ensure that only trusted users have permissions to modify roles or access sensitive REST API endpoints.

Monitor logs for suspicious role change attempts and revoke any unauthorized role escalations promptly.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated users with Student-level access and above to escalate their privileges to administrator level by exploiting the Masteriyo LMS plugin's REST API role update functionality.

Such unauthorized privilege escalation can lead to unauthorized access to sensitive user data and administrative functions, potentially violating data protection requirements under standards like GDPR and HIPAA.

Specifically, GDPR requires strict access controls to personal data, and HIPAA mandates safeguards to protect electronic protected health information (ePHI). This vulnerability undermines these controls by enabling privilege escalation.

Therefore, exploitation of this vulnerability could result in non-compliance with these regulations due to insufficient access control and increased risk of data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart