CVE-2024-13127: CWE-79 Cross-Site Scripting (XSS) in Unknown LearnPress
The LearnPress WordPress plugin before 4.2.7.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2024-13127 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the LearnPress WordPress plugin versions prior to 4.2.7.5.1. LearnPress is a widely used plugin for creating and managing online courses within WordPress environments. The vulnerability arises because certain plugin settings are not properly sanitized or escaped, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected settings or pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite setups, which typically restricts the ability to post unfiltered HTML content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, requires low attack complexity, but needs high privileges and user interaction. The vulnerability impacts confidentiality and integrity but not availability, and it has a scope change due to potential cross-site impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WordPress sites with the LearnPress plugin, this vulnerability poses a risk primarily to administrative users and potentially other users who access affected settings pages. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. In educational institutions, e-learning platforms, or corporate training portals relying on LearnPress, this could compromise sensitive user data, disrupt course management, or facilitate further attacks within the network. Given the requirement for high privileges and user interaction, the risk is somewhat mitigated but still significant in environments where multiple administrators or trusted users manage the platform. The vulnerability could also be leveraged in targeted attacks against organizations with complex multisite WordPress deployments, common in larger European enterprises and educational consortia.
Mitigation Recommendations
European organizations should immediately verify their LearnPress plugin version and upgrade to version 4.2.7.5.1 or later once available. Until a patch is released, administrators should restrict plugin access strictly to trusted personnel and audit user privileges to minimize the number of high-privilege users. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize any custom settings or inputs within LearnPress manually. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to LearnPress. Additionally, monitor logs for unusual administrative activity and educate administrators about the risks of executing untrusted scripts or content. For multisite environments, consider additional isolation or segmentation to reduce cross-site impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-13127: CWE-79 Cross-Site Scripting (XSS) in Unknown LearnPress
Description
The LearnPress WordPress plugin before 4.2.7.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2024-13127 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the LearnPress WordPress plugin versions prior to 4.2.7.5.1. LearnPress is a widely used plugin for creating and managing online courses within WordPress environments. The vulnerability arises because certain plugin settings are not properly sanitized or escaped, allowing high-privilege users, such as administrators, to inject malicious scripts that are persistently stored and executed when other users or administrators access the affected settings or pages. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite setups, which typically restricts the ability to post unfiltered HTML content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based, requires low attack complexity, but needs high privileges and user interaction. The vulnerability impacts confidentiality and integrity but not availability, and it has a scope change due to potential cross-site impact. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation leading to XSS.
Potential Impact
For European organizations using WordPress sites with the LearnPress plugin, this vulnerability poses a risk primarily to administrative users and potentially other users who access affected settings pages. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. In educational institutions, e-learning platforms, or corporate training portals relying on LearnPress, this could compromise sensitive user data, disrupt course management, or facilitate further attacks within the network. Given the requirement for high privileges and user interaction, the risk is somewhat mitigated but still significant in environments where multiple administrators or trusted users manage the platform. The vulnerability could also be leveraged in targeted attacks against organizations with complex multisite WordPress deployments, common in larger European enterprises and educational consortia.
Mitigation Recommendations
European organizations should immediately verify their LearnPress plugin version and upgrade to version 4.2.7.5.1 or later once available. Until a patch is released, administrators should restrict plugin access strictly to trusted personnel and audit user privileges to minimize the number of high-privilege users. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. Regularly review and sanitize any custom settings or inputs within LearnPress manually. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to LearnPress. Additionally, monitor logs for unusual administrative activity and educate administrators about the risks of executing untrusted scripts or content. For multisite environments, consider additional isolation or segmentation to reduce cross-site impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-01-02T19:46:17.241Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec215
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 7:41:04 AM
Last updated: 7/26/2025, 1:13:27 AM
Views: 13
Related Threats
Carmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumCVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.