Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13599: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thimpress LearnPress – WordPress LMS Plugin

0
Medium
VulnerabilityCVE-2024-13599cvecve-2024-13599cwe-79
Published: Sat Jan 25 2025 (01/25/2025, 07:24:15 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

CVE-2024-13599 is a stored cross-site scripting (XSS) vulnerability in the LearnPress WordPress LMS plugin affecting all versions up to 4. 2. 7. 5. The flaw arises from insufficient input sanitization and output escaping of lesson names, allowing authenticated users with Instructor-level or higher privileges to inject malicious scripts. These scripts execute whenever any user views the compromised page, potentially leading to session hijacking, privilege escalation, or unauthorized actions. The vulnerability has a CVSS score of 6. 4 (medium severity), requires low privileges but no user interaction, and impacts confidentiality and integrity. No public exploits are currently known. Organizations using LearnPress should prioritize patching or applying mitigations to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:28:33 UTC

Technical Analysis

CVE-2024-13599 is a stored cross-site scripting vulnerability identified in the LearnPress – WordPress LMS Plugin, a widely used learning management system plugin for WordPress. The vulnerability exists due to improper neutralization of input during web page generation (CWE-79), specifically insufficient sanitization and escaping of the lesson name field. Authenticated attackers with LP Instructor-level access or higher can exploit this flaw by injecting arbitrary JavaScript code into lesson names. Because the injected scripts are stored persistently, they execute in the context of any user who views the affected lesson page, potentially compromising user sessions, stealing cookies, or performing unauthorized actions on behalf of users. The vulnerability affects all versions up to and including 4.2.7.5. The CVSS v3.1 base score is 6.4, reflecting network attack vector, low attack complexity, privileges required at the instructor level, no user interaction needed, and a scope change due to impact on other users. The impact primarily affects confidentiality and integrity, with no direct availability impact. No patches or public exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The flaw highlights the importance of proper input validation and output encoding in web applications, especially in multi-user environments like LMS platforms.

Potential Impact

The vulnerability allows attackers with relatively low privileges (instructor-level) to execute persistent cross-site scripting attacks, which can compromise the confidentiality and integrity of user data. Attackers can hijack user sessions, steal authentication tokens, manipulate page content, or perform actions on behalf of other users, potentially leading to unauthorized access or privilege escalation within the LMS environment. This can undermine trust in the e-learning platform, expose sensitive educational data, and disrupt organizational operations. Since the vulnerability affects all users who view the injected content, the scope of impact can be broad within affected organizations. Although no availability impact is noted, the reputational damage and potential data breaches can have significant consequences. Organizations relying on LearnPress for critical training or educational services may face compliance and regulatory risks if exploited.

Mitigation Recommendations

Organizations should immediately upgrade the LearnPress plugin to a fixed version once released by the vendor. In the absence of an official patch, administrators should restrict instructor-level privileges to trusted users only and audit existing lesson names for suspicious content. Implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting lesson name parameters can provide interim protection. Additionally, applying content security policies (CSP) to limit script execution sources can reduce exploitation impact. Regularly monitoring logs for unusual activity and educating instructors about secure content practices are also recommended. Developers should review and enhance input validation and output encoding routines in the plugin codebase to prevent similar issues. Finally, consider isolating LMS environments and enforcing strict access controls to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-21T17:21:02.303Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e63b7ef31ef0b59f5a5

Added to database: 2/25/2026, 9:49:23 PM

Last enriched: 2/25/2026, 11:28:33 PM

Last updated: 2/26/2026, 6:17:46 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats