Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10376: CWE-352 Cross-Site Request Forgery (CSRF) in ercbs Course Redirects for Learndash Plugin

0
Medium
VulnerabilityCVE-2025-10376cvecve-2025-10376cwe-352
Published: Sat Oct 11 2025 (10/11/2025, 09:28:42 UTC)
Source: CVE Database V5
Vendor/Project: ercbs
Product: Course Redirects for Learndash Plugin

Description

The Course Redirects for Learndash plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.4. This is due to missing nonce validation when processing form submissions on the settings page. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 10/11/2025, 09:59:47 UTC

Technical Analysis

CVE-2025-10376 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Course Redirects for Learndash plugin for WordPress, a tool used to manage course redirection settings within the Learndash e-learning ecosystem. The vulnerability exists in all versions up to and including 0.4 due to the absence of nonce validation when processing form submissions on the plugin's settings page. Nonce validation is a security measure that ensures that requests to change settings originate from legitimate users and not from forged requests. Because this validation is missing, an attacker can craft a malicious link or webpage that, when visited by an authenticated site administrator, causes the administrator’s browser to unknowingly submit a request that modifies the plugin’s settings. This attack vector requires user interaction (clicking a link) but no prior authentication by the attacker, making it a significant risk for sites where administrators might be targeted via phishing or social engineering. The vulnerability impacts the integrity of the plugin’s configuration but does not expose confidential data or disrupt availability. The CVSS 3.1 score of 4.3 reflects a medium severity, with an attack vector of network, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity only. No public exploits have been reported, but the vulnerability is published and should be addressed promptly to prevent potential misuse.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized modification of plugin settings, which could lead to misconfiguration of course redirection behavior in e-learning platforms. This may result in users being redirected to unintended or malicious sites, potentially facilitating further attacks such as phishing or malware distribution. While confidentiality and availability are not directly affected, the integrity compromise could undermine trust in the e-learning environment and disrupt user experience. Organizations relying on Learndash and this plugin for critical training or compliance programs may face operational disruptions or reputational damage. Additionally, attackers could leverage this vulnerability as a foothold for more complex attacks if combined with other vulnerabilities or social engineering tactics. The risk is heightened in environments where administrators have elevated privileges and may be targeted via spear-phishing campaigns. Given the widespread use of WordPress and e-learning platforms in Europe, the vulnerability poses a tangible risk to educational institutions, corporate training departments, and other organizations using Learndash.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for updates or patches from the plugin vendor and apply them immediately once available. In the absence of an official patch, administrators should implement nonce validation in the plugin’s form processing code to ensure requests are legitimate. Restrict access to the plugin’s settings page strictly to trusted administrators and consider implementing multi-factor authentication (MFA) for admin accounts to reduce the risk of account compromise. Educate administrators about the risks of phishing and social engineering attacks, emphasizing caution when clicking on unsolicited links. Employ web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the plugin’s endpoints. Regularly audit plugin configurations and monitor logs for unauthorized changes. Where possible, isolate the WordPress environment hosting Learndash to minimize exposure. Finally, consider alternative plugins with better security track records if timely patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-12T15:44:43.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ea263d5baaa01f1ca0ff96

Added to database: 10/11/2025, 9:41:17 AM

Last enriched: 10/11/2025, 9:59:47 AM

Last updated: 10/16/2025, 12:37:29 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats