Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1512: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stylemix MasterStudy LMS WordPress Plugin – for Online Courses and Education

0
Critical
VulnerabilityCVE-2024-1512cvecve-2024-1512cwe-89
Published: Sat Feb 17 2024 (02/17/2024, 07:36:57 UTC)
Source: CVE Database V5
Vendor/Project: stylemix
Product: MasterStudy LMS WordPress Plugin – for Online Courses and Education

Description

CVE-2024-1512 is a critical SQL Injection vulnerability in the MasterStudy LMS WordPress plugin used for online courses and education. It affects all versions up to and including 3. 2. 5 and allows unauthenticated attackers to exploit the 'user' parameter in the /lms/stm-lms/order/items REST API endpoint. The vulnerability arises from improper neutralization of special SQL elements, enabling attackers to append malicious SQL queries. This can lead to unauthorized extraction, modification, or deletion of sensitive database information, impacting confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and has a CVSS score of 9. 8, indicating critical severity. Organizations using this plugin are at high risk of data breaches and service disruption. Immediate patching or mitigation is essential to prevent exploitation.

AI-Powered Analysis

AILast updated: 02/26/2026, 09:39:24 UTC

Technical Analysis

CVE-2024-1512 is a critical SQL Injection vulnerability identified in the MasterStudy LMS WordPress plugin, a popular tool for managing online courses and education. The flaw exists in all versions up to 3.2.5 due to insufficient escaping and preparation of the 'user' parameter in the /lms/stm-lms/order/items REST route. This parameter is vulnerable to union-based SQL Injection, allowing unauthenticated attackers to inject arbitrary SQL commands into existing queries. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), which enables attackers to manipulate database queries to extract sensitive data, modify records, or disrupt service availability. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the ease of exploitation and critical impact make this a high-priority threat. The plugin’s widespread use in educational institutions and online learning platforms globally amplifies the potential damage. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts to protect affected systems.

Potential Impact

The impact of CVE-2024-1512 is severe for organizations using the MasterStudy LMS WordPress plugin. Successful exploitation can lead to unauthorized disclosure of sensitive data such as user information, course details, payment records, and other confidential educational data. Attackers can also alter or delete database contents, potentially disrupting course delivery and administrative functions, causing denial of service. The vulnerability threatens the confidentiality, integrity, and availability of affected systems. Educational institutions, e-learning providers, and any organization relying on this plugin face risks of reputational damage, regulatory penalties due to data breaches, and operational downtime. Given the unauthenticated nature of the exploit, attackers can launch attacks at scale, increasing the likelihood of widespread compromise. The critical CVSS score underscores the urgency for remediation to prevent data exfiltration and service disruption.

Mitigation Recommendations

1. Immediate upgrade to a patched version of the MasterStudy LMS plugin once available from the vendor. 2. Until a patch is released, implement Web Application Firewall (WAF) rules to detect and block SQL Injection attempts targeting the /lms/stm-lms/order/items REST endpoint, specifically filtering suspicious 'user' parameter inputs. 3. Restrict access to the REST API endpoint by IP whitelisting or authentication mechanisms where feasible to limit exposure. 4. Conduct thorough code review and input validation enhancements to ensure all user-supplied parameters are properly sanitized and parameterized queries are used to prevent SQL Injection. 5. Monitor logs for unusual database query patterns or errors indicative of injection attempts. 6. Educate administrators and developers about the risks of SQL Injection and the importance of secure coding practices. 7. Regularly backup databases and test restoration procedures to minimize impact from potential data tampering or loss. 8. Employ intrusion detection systems (IDS) to alert on suspicious activities related to the plugin. These steps go beyond generic advice by focusing on immediate protective controls and long-term secure development practices specific to this plugin’s vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-02-14T21:01:12.832Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d33b7ef31ef0b56ee9d

Added to database: 2/25/2026, 9:44:19 PM

Last enriched: 2/26/2026, 9:39:24 AM

Last updated: 2/26/2026, 11:16:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats