Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8009: CWE-863 Incorrect Authorization in Sensei LMS

0
Medium
VulnerabilityCVE-2024-8009cvecve-2024-8009cwe-863
Published: Thu May 15 2025 (05/15/2025, 20:09:47 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Sensei LMS

Description

The Sensei LMS WordPress plugin before 4.20.0 disclose all users of the blog including their email address to teachers on the students page

AI-Powered Analysis

AILast updated: 11/13/2025, 21:30:54 UTC

Technical Analysis

CVE-2024-8009 is a vulnerability classified under CWE-863 (Incorrect Authorization) affecting the Sensei LMS WordPress plugin versions before 4.20.0. The flaw allows users with teacher-level permissions to access a list of all users on the blog, including their email addresses, on the students page. This occurs because the plugin fails to properly restrict access to sensitive user information, exposing data that should be limited to administrators or the users themselves. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and requires the attacker to have privileges equivalent to a teacher (PR:L). No user interaction is needed (UI:N), and the scope remains unchanged (S:U). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. Although no exploits are currently known in the wild, the exposure of email addresses can facilitate phishing, social engineering, or targeted attacks against users. The vulnerability was published on May 15, 2025, and is tracked by WPScan and CISA. No official patches are linked in the provided data, but upgrading to Sensei LMS 4.20.0 or later is recommended to remediate the issue.

Potential Impact

For European organizations, this vulnerability primarily threatens user privacy by exposing email addresses of all blog users to teachers, who may not be authorized to access such data. This can lead to increased risk of phishing attacks, spear-phishing campaigns, and social engineering targeting students or other users. Educational institutions and corporate training environments using Sensei LMS are particularly at risk, as they often handle sensitive personal data and must comply with GDPR regulations. Unauthorized disclosure of email addresses could result in regulatory penalties and reputational damage. However, since exploitation requires teacher-level access, the risk is somewhat mitigated by existing access controls. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. Nonetheless, the breach of confidentiality can have significant privacy implications, especially in sectors handling minors or sensitive educational content.

Mitigation Recommendations

European organizations should immediately upgrade Sensei LMS to version 4.20.0 or later where this authorization flaw is fixed. Until the upgrade is applied, administrators should audit and restrict teacher-level permissions to only trusted users to minimize exposure. Implement strict role-based access controls and regularly review user roles and capabilities within WordPress. Consider deploying monitoring to detect unusual access patterns to user lists or email data. Educate teachers and staff about the sensitivity of user data and the risks of unauthorized disclosure. Additionally, organizations should ensure compliance with GDPR by informing affected users if a data exposure incident occurs. If upgrading is delayed, custom code or plugins could be used to override or restrict access to user email addresses on the students page as a temporary workaround.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2024-08-20T12:29:53.471Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe20

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 11/13/2025, 9:30:54 PM

Last updated: 11/20/2025, 10:23:02 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats