Skip to main content

CVE-2024-13127: CWE-79 Cross-Site Scripting (XSS) in Unknown LearnPress

Medium
VulnerabilityCVE-2024-13127cvecve-2024-13127cwe-79
Published: Thu May 15 2025 (05/15/2025, 20:06:58 UTC)
Source: CVE
Vendor/Project: Unknown
Product: LearnPress

Description

The LearnPress WordPress plugin before 4.2.7.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/04/2025, 07:41:04 UTC

Technical Analysis

CVE-2024-13127 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the LearnPress WordPress plugin versions prior to 4.2.7.5.1. LearnPress is a widely used plugin for creating and managing online courses within WordPress environments. The vulnerability arises because certain plugin settings are not properly sanitized or escaped, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected settings or pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite setups, which typically restricts the ability to post unfiltered HTML content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, requires low attack complexity, but needs high privileges and user interaction. The vulnerability impacts confidentiality and integrity but not availability, and it has a scope change due to potential cross-site impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation leading to XSS.

Potential Impact

For European organizations using WordPress sites with the LearnPress plugin, this vulnerability poses a risk primarily to administrative users and potentially other users who access affected settings pages. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. In educational institutions, e-learning platforms, or corporate training portals relying on LearnPress, this could compromise sensitive user data, disrupt course management, or facilitate further attacks within the network. Given the requirement for high privileges and user interaction, the risk is somewhat mitigated but still significant in environments where multiple administrators or trusted users manage the platform. The vulnerability could also be leveraged in targeted attacks against organizations with complex multisite WordPress deployments, common in larger European enterprises and educational consortia.

Mitigation Recommendations

European organizations should immediately verify their LearnPress plugin version and upgrade to version 4.2.7.5.1 or later once available. Until a patch is released, administrators should restrict plugin access strictly to trusted personnel and audit user privileges to minimize the number of high-privilege users. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize any custom settings or inputs within LearnPress manually. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to LearnPress. Additionally, monitor logs for unusual administrative activity and educate administrators about the risks of executing untrusted scripts or content. For multisite environments, consider additional isolation or segmentation to reduce cross-site impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-02T19:46:17.241Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec215

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 7:41:04 AM

Last updated: 7/26/2025, 1:13:27 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats