Skip to main content

CVE-2022-3360: CWE-502 Deserialization of Untrusted Data in Unknown LearnPress – WordPress LMS Plugin

High
VulnerabilityCVE-2022-3360cvecve-2022-3360cwe-502
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: LearnPress – WordPress LMS Plugin

Description

The LearnPress WordPress plugin before 4.1.7.2 unserialises user input in a REST API endpoint available to unauthenticated users, which could lead to PHP Object Injection when a suitable gadget is present, leadint to remote code execution (RCE). To successfully exploit this vulnerability attackers must have knowledge of the site secrets, allowing them to generate a valid hash via the wp_hash() function.

AI-Powered Analysis

AILast updated: 07/05/2025, 15:58:04 UTC

Technical Analysis

CVE-2022-3360 is a high-severity vulnerability affecting the LearnPress WordPress LMS plugin versions prior to 4.1.7.2. The core issue is an insecure deserialization flaw (CWE-502) in a REST API endpoint that processes user input without proper validation. Specifically, the plugin unserializes data from unauthenticated users, which can lead to PHP Object Injection if a suitable gadget chain exists within the application. This vulnerability can be exploited to achieve remote code execution (RCE), allowing an attacker to execute arbitrary PHP code on the server hosting the vulnerable LearnPress plugin. However, exploitation requires the attacker to have knowledge of the site’s secret keys to generate a valid hash using WordPress's wp_hash() function, which acts as a safeguard against trivial exploitation. The CVSS v3.1 score is 8.1, reflecting the high impact on confidentiality, integrity, and availability, though the attack complexity is high due to the need for secret knowledge. No known exploits in the wild have been reported to date. The vulnerability was publicly disclosed on October 31, 2022, and no official patch links were provided in the source information, indicating that users should verify plugin updates or apply mitigations promptly. The vulnerability arises from unsafe handling of serialized PHP objects in REST API requests, a common vector for PHP Object Injection attacks, which can lead to full system compromise if exploited successfully.

Potential Impact

For European organizations using WordPress sites with the LearnPress LMS plugin, this vulnerability poses a significant risk. Educational institutions, e-learning providers, and corporate training platforms relying on LearnPress could face unauthorized remote code execution, leading to data breaches, defacement, or complete server takeover. Given that the vulnerability allows unauthenticated access to the vulnerable endpoint, attackers could potentially compromise sites without needing valid user credentials, increasing the attack surface. The requirement for knowledge of site secrets limits exploitation but does not eliminate risk, especially if secrets are leaked or weak. The impact includes potential exposure of sensitive educational data, disruption of e-learning services, and reputational damage. Additionally, compromised sites could be used as pivot points for lateral movement within organizational networks or as part of larger botnets or ransomware campaigns targeting European entities. The high CVSS score reflects the critical nature of the threat to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

1. Immediate update of the LearnPress plugin to version 4.1.7.2 or later once available, as vendors typically release patches addressing such vulnerabilities. If no patch is available, consider temporarily disabling the LearnPress plugin or the vulnerable REST API endpoints to prevent exploitation. 2. Restrict access to the REST API endpoints related to LearnPress by implementing web application firewall (WAF) rules or IP whitelisting to limit unauthenticated access. 3. Rotate WordPress site secret keys (AUTH_KEY, SECURE_AUTH_KEY, LOGGED_IN_KEY, NONCE_KEY) to invalidate any previously generated hashes and reduce the risk of hash forgery. 4. Conduct a thorough audit of server logs and WordPress activity to detect any suspicious deserialization attempts or unusual API requests. 5. Employ runtime application self-protection (RASP) or intrusion detection systems capable of detecting PHP Object Injection patterns. 6. Educate site administrators on secure plugin management and the risks of using outdated or untrusted plugins. 7. Implement least privilege principles for WordPress file and directory permissions to limit the impact of potential code execution.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-29T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9dac

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 3:58:04 PM

Last updated: 7/30/2025, 6:54:08 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats