Skip to main content

CVE-2025-0466: CWE-862 Missing Authorization in Sensei LMS

Medium
VulnerabilityCVE-2025-0466cvecve-2025-0466cwe-862
Published: Tue Feb 04 2025 (02/04/2025, 06:00:11 UTC)
Source: CVE Database V5
Product: Sensei LMS

Description

The Sensei LMS WordPress plugin before 4.24.4 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak sensei_email and sensei_message Information.

AI-Powered Analysis

AILast updated: 08/27/2025, 12:32:56 UTC

Technical Analysis

CVE-2025-0466 is a medium-severity vulnerability identified in the Sensei LMS WordPress plugin versions prior to 4.24.4. The root cause is a missing authorization check (CWE-862) on certain REST API routes within the plugin. This flaw allows unauthenticated attackers to access sensitive information, specifically the 'sensei_email' and 'sensei_message' data fields, without requiring any authentication or user interaction. The vulnerability arises because the plugin fails to properly restrict access to some of its REST endpoints, exposing potentially sensitive user or system data. The CVSS 3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no impact on integrity or availability. Although no known exploits are currently reported in the wild, the vulnerability represents a privacy risk due to unauthorized data disclosure. The affected product, Sensei LMS, is a popular WordPress learning management system plugin used to create and manage online courses, quizzes, and lessons. The exposed data fields suggest leakage of email addresses and message content, which could be leveraged for phishing, social engineering, or further targeted attacks if combined with other vulnerabilities or data sources.

Potential Impact

For European organizations using Sensei LMS, this vulnerability could lead to unauthorized disclosure of user email addresses and message content, potentially violating data protection regulations such as the GDPR. Leakage of personally identifiable information (PII) can result in reputational damage, regulatory fines, and loss of user trust. Educational institutions, training providers, and corporate learning departments relying on Sensei LMS are particularly at risk, as their user base often includes students, employees, and partners whose data privacy is critical. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone can facilitate targeted phishing campaigns or identity theft. The lack of authentication requirement means attackers can exploit this vulnerability remotely and anonymously, increasing the risk of widespread data harvesting. The impact is heightened in Europe due to strict data privacy laws and the high adoption of WordPress-based LMS solutions in educational and corporate sectors.

Mitigation Recommendations

European organizations should immediately update Sensei LMS to version 4.24.4 or later, where this authorization issue has been addressed. If immediate patching is not possible, administrators should restrict access to the WordPress REST API endpoints related to Sensei LMS using web application firewalls (WAFs), IP whitelisting, or custom access control rules to block unauthenticated requests. Additionally, monitoring web server logs for unusual access patterns to Sensei LMS REST routes can help detect exploitation attempts. Organizations should review and audit their LMS user data exposure and consider implementing additional encryption or data masking for sensitive fields. Regular security assessments and plugin vulnerability scanning should be incorporated into the patch management process. Finally, organizations must ensure compliance with GDPR by notifying affected users and data protection authorities if a data breach is suspected due to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-01-14T08:58:47.855Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68aef76ead5a09ad0061da15

Added to database: 8/27/2025, 12:17:50 PM

Last enriched: 8/27/2025, 12:32:56 PM

Last updated: 8/27/2025, 3:05:15 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats