Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6589: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in thimpress LearnPress – WordPress LMS Plugin

0
High
VulnerabilityCVE-2024-6589cvecve-2024-6589cwe-98
Published: Thu Jul 25 2024 (07/25/2024, 10:59:51 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

CVE-2024-6589 is a high-severity Local File Inclusion (LFI) vulnerability in the LearnPress WordPress LMS plugin affecting all versions up to 4. 2. 6. 8. 2. It allows authenticated users with Contributor-level access or higher to exploit the 'render_content_block_template' function to include and execute arbitrary files on the server. This can lead to remote code execution by uploading and including malicious PHP code disguised as safe file types. The vulnerability enables attackers to bypass access controls, access sensitive data, and fully compromise affected systems without requiring user interaction. No public exploits are known yet, but the CVSS score of 8. 8 reflects the significant risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:17:21 UTC

Technical Analysis

CVE-2024-6589 is a Local File Inclusion vulnerability categorized under CWE-98, found in the LearnPress WordPress LMS plugin developed by thimpress. The flaw exists in the 'render_content_block_template' function, which improperly controls the filename used in include/require statements. This improper validation allows authenticated users with Contributor-level permissions or higher to specify arbitrary files for inclusion. Since WordPress Contributor roles can upload media files, attackers can upload PHP code disguised as images or other allowed file types and then include these files via the vulnerable function, resulting in remote code execution on the server. The vulnerability affects all versions up to and including 4.2.6.8.2. Exploitation requires authentication but no user interaction beyond that. The CVSS 3.1 score is 8.8 (High), reflecting network attack vector, low attack complexity, privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. While no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation pose a serious threat to affected WordPress sites using LearnPress. This vulnerability could be leveraged to bypass WordPress access controls, execute arbitrary PHP code, and potentially take full control of the web server environment hosting the LMS plugin.

Potential Impact

The impact of CVE-2024-6589 is significant for organizations using the LearnPress plugin on WordPress sites. Successful exploitation can lead to full remote code execution, allowing attackers to execute arbitrary PHP code on the server. This can result in complete compromise of the web server, including unauthorized access to sensitive data such as user information, course content, and administrative credentials. Attackers can bypass access controls, escalate privileges, implant backdoors, or pivot to other internal systems. The availability of the LMS platform can be disrupted, affecting business continuity and user trust. Educational institutions, e-learning providers, and any organizations relying on LearnPress for online course delivery are at risk. The vulnerability's requirement for only Contributor-level access lowers the bar for exploitation, increasing the likelihood of insider threats or compromised accounts being used to launch attacks. The absence of known public exploits currently provides a window for remediation, but the high CVSS score indicates urgent attention is needed to prevent potential widespread abuse.

Mitigation Recommendations

1. Immediate upgrade: Monitor for official patches or updates from thimpress addressing CVE-2024-6589 and apply them as soon as they become available. 2. Access control tightening: Restrict Contributor-level permissions to trusted users only and review user roles to minimize unnecessary privileges. 3. File upload restrictions: Implement strict validation and sanitization of uploaded files, disallowing executable code disguised as images or other media types. 4. Web application firewall (WAF): Deploy or update WAF rules to detect and block attempts to exploit LFI via the vulnerable function, focusing on suspicious include/require patterns. 5. Disable vulnerable functionality: If feasible, disable or restrict the 'render_content_block_template' function or related plugin features until patched. 6. Monitoring and logging: Enable detailed logging of file inclusion requests and user activities to detect anomalous behavior indicative of exploitation attempts. 7. Incident response readiness: Prepare to respond to potential compromises by having backups, forensic tools, and remediation plans in place. 8. Network segmentation: Isolate WordPress servers from critical internal networks to limit lateral movement if compromised. These measures combined reduce the attack surface and mitigate the risk until a patch is applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-08T22:19:26.922Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c08b7ef31ef0b55f2df

Added to database: 2/25/2026, 9:39:20 PM

Last enriched: 2/26/2026, 3:17:21 AM

Last updated: 2/26/2026, 6:18:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats