Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8522: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in thimpress LearnPress – WordPress LMS Plugin

0
Critical
VulnerabilityCVE-2024-8522cvecve-2024-8522cwe-89
Published: Thu Sep 12 2024 (09/12/2024, 08:30:46 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

CVE-2024-8522 is a critical SQL Injection vulnerability in the LearnPress WordPress LMS plugin affecting all versions up to 4. 2. 7. It arises from improper sanitization of the 'c_only_fields' parameter in the /wp-json/learnpress/v1/courses REST API endpoint, allowing unauthenticated attackers to inject malicious SQL commands. This flaw enables attackers to extract sensitive database information and potentially modify or delete data, impacting confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and has a CVSS score of 10. Organizations using LearnPress for e-learning platforms are at high risk, especially those with public-facing WordPress sites. Immediate patching or mitigation is critical to prevent exploitation. Countries with significant WordPress usage and e-learning adoption are most likely affected. Defenders should monitor API usage, implement web application firewalls with SQLi detection, and restrict access to the vulnerable endpoint until patched.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:04:05 UTC

Technical Analysis

CVE-2024-8522 is a critical SQL Injection vulnerability identified in the LearnPress – WordPress LMS Plugin, a widely used learning management system plugin for WordPress. The vulnerability exists in all versions up to and including 4.2.7 and is due to improper neutralization of special elements in SQL commands (CWE-89). Specifically, the 'c_only_fields' parameter in the /wp-json/learnpress/v1/courses REST API endpoint is not properly escaped or sanitized before being incorporated into SQL queries. This lack of input validation allows unauthenticated attackers to append arbitrary SQL code to existing queries. Because the REST API endpoint is publicly accessible and does not require authentication, attackers can exploit this flaw remotely without any credentials or user interaction. Successful exploitation can lead to unauthorized disclosure of sensitive information stored in the database, including user data and course content, as well as potential data manipulation or deletion. The vulnerability has been assigned a CVSS 3.1 base score of 10.0, reflecting its critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. No official patches were linked at the time of publication, increasing the urgency for mitigation. The vulnerability was publicly disclosed on September 12, 2024, with no known exploits in the wild yet, but the critical nature and ease of exploitation make it a high priority for immediate remediation.

Potential Impact

The impact of CVE-2024-8522 is severe for organizations using the LearnPress plugin on WordPress sites, especially those hosting sensitive educational content or personal user data. Exploitation can lead to full database compromise, including theft of confidential information such as user credentials, personal identifiable information (PII), and proprietary course materials. Attackers could also modify or delete data, disrupting the availability and integrity of the LMS platform. Given the unauthenticated and remote nature of the exploit, any public-facing WordPress site with LearnPress installed is at risk, potentially leading to widespread data breaches and operational downtime. This can damage organizational reputation, lead to regulatory penalties, and cause loss of trust among users and customers. The vulnerability's presence in a popular LMS plugin increases the likelihood of targeted attacks against educational institutions, online training providers, and corporate e-learning platforms globally.

Mitigation Recommendations

Organizations should immediately upgrade the LearnPress plugin to a patched version once available from the vendor. Until an official patch is released, implement the following mitigations: 1) Restrict access to the /wp-json/learnpress/v1/courses REST API endpoint using web server rules or WordPress security plugins to limit exposure. 2) Deploy a Web Application Firewall (WAF) with SQL Injection detection and prevention capabilities to block malicious payloads targeting the 'c_only_fields' parameter. 3) Monitor web server and application logs for unusual or suspicious API requests indicative of exploitation attempts. 4) Disable or limit REST API access for unauthenticated users if feasible in the LMS context. 5) Conduct a thorough audit of database integrity and user accounts to detect any signs of compromise. 6) Educate site administrators about the vulnerability and encourage prompt updates and security best practices. 7) Consider isolating the LMS environment or using network segmentation to reduce potential lateral movement if exploited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-06T15:23:41.132Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c2cb7ef31ef0b560be1

Added to database: 2/25/2026, 9:39:56 PM

Last enriched: 2/26/2026, 4:04:05 AM

Last updated: 2/26/2026, 6:30:55 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats