CVE-2026-4484
Privilege Escalation in Masteriyo LMS Plugin Allows Admin Access
Publication date: 2026-03-26
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| masteriyo | learning_management_system | to 2.1.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can have a severe impact because it allows an attacker with low-level access (Student-level) to escalate their privileges to administrator. This means the attacker could gain full control over the WordPress site, including managing users, changing site settings, installing or deleting plugins, and accessing sensitive data.
Can you explain this vulnerability to me?
The Masteriyo LMS plugin for WordPress has a vulnerability in all versions up to and including 2.1.6 that allows privilege escalation. This occurs because the plugin's 'InstructorsController::prepare_object_for_database' function permits users to update their user roles. As a result, authenticated users with Student-level access or higher can elevate their privileges to administrator level.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unauthorized privilege escalation through the Masteriyo LMS WordPress plugin REST API, specifically by updating user roles via the InstructorsController. Detection involves monitoring REST API requests to the endpoint related to instructor user updates.
You can detect attempts to exploit this vulnerability by checking for REST API calls to the route base 'users/instructors' under the namespace 'masteriyo/v1' that include role changes from users without administrator privileges.
Suggested commands to detect suspicious activity include:
- Using web server logs (e.g., Apache or Nginx) to search for POST or PUT requests to the REST API endpoint: grep -i 'wp-json/masteriyo/v1/users/instructors' /var/log/apache2/access.log
- Checking for REST API requests that include the 'roles' parameter in the request body, which could indicate attempts to change user roles.
- Using WordPress debug or audit logs (if enabled) to track user role changes or REST API permission errors.
- Monitoring for unexpected changes in user roles, especially elevation from Student-level to Administrator.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation is to update the Masteriyo LMS plugin to version 2.1.7 or later, where the vulnerability has been fixed by enforcing permission checks on role changes in the REST API.
If immediate update is not possible, restrict access to the REST API endpoints related to instructor user management to trusted users only.
Additionally, review and limit user capabilities to ensure that only trusted users have permissions to modify roles or access sensitive REST API endpoints.
Monitor logs for suspicious role change attempts and revoke any unauthorized role escalations promptly.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated users with Student-level access and above to escalate their privileges to administrator level by exploiting the Masteriyo LMS plugin's REST API role update functionality.
Such unauthorized privilege escalation can lead to unauthorized access to sensitive user data and administrative functions, potentially violating data protection requirements under standards like GDPR and HIPAA.
Specifically, GDPR requires strict access controls to personal data, and HIPAA mandates safeguards to protect electronic protected health information (ePHI). This vulnerability undermines these controls by enabling privilege escalation.
Therefore, exploitation of this vulnerability could result in non-compliance with these regulations due to insufficient access control and increased risk of data breaches.