Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11368: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in thimpress LearnPress – WordPress LMS Plugin

0
Medium
VulnerabilityCVE-2025-11368cvecve-2025-11368cwe-200
Published: Fri Nov 21 2025 (11/21/2025, 05:32:04 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 4.2.9.4. This is due to missing capability checks in the REST endpoint /wp-json/lp/v1/load_content_via_ajax which allows arbitrary callback execution of admin-only template methods. This makes it possible for unauthenticated attackers to retrieve admin curriculum HTML, quiz questions with correct answers, course materials, and other sensitive educational content via the REST API endpoint granted they can supply valid numeric IDs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:57:38 UTC

Technical Analysis

CVE-2025-11368 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the LearnPress WordPress LMS plugin, versions up to and including 4.2.9.4. The issue arises from missing capability checks in the REST API endpoint /wp-json/lp/v1/load_content_via_ajax. This endpoint allows unauthenticated users to invoke admin-only template methods by supplying arbitrary numeric IDs, leading to unauthorized disclosure of sensitive educational content. Specifically, attackers can retrieve admin curriculum HTML, quiz questions along with correct answers, course materials, and other protected data. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation and the confidentiality impact, while integrity and availability remain unaffected. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to educational institutions and organizations relying on LearnPress for managing course content and assessments, as sensitive information leakage could undermine academic integrity and privacy.

Potential Impact

The primary impact of CVE-2025-11368 is the unauthorized disclosure of sensitive educational content, including course materials, curriculum details, and quiz answers. This exposure can lead to academic dishonesty, loss of trust in the educational platform, and potential privacy violations for students and instructors. Organizations using LearnPress may face reputational damage and compliance issues, especially if personal or proprietary educational content is leaked. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for online learning environments. Attackers could exploit this flaw to gain unfair advantages in assessments or to harvest intellectual property. The ease of exploitation without authentication increases the threat level, particularly for publicly accessible WordPress LMS sites. The absence of known exploits currently provides a window for mitigation, but the risk remains significant given the widespread use of WordPress and LearnPress in education worldwide.

Mitigation Recommendations

To mitigate CVE-2025-11368, organizations should immediately update the LearnPress plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to /wp-json/lp/v1/load_content_via_ajax. Additionally, disabling REST API access for unauthenticated users or limiting it via authentication plugins can reduce exposure. Review and harden WordPress user roles and permissions to ensure that sensitive content is not accessible beyond intended users. Monitoring web server logs for suspicious requests targeting the vulnerable endpoint can help detect exploitation attempts. Educating site administrators about the risk and encouraging regular plugin updates are critical. Finally, consider isolating LMS content behind VPNs or intranet access controls where feasible to further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-06T13:47:47.518Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ffc17a535ade79490ffb1

Added to database: 11/21/2025, 5:43:51 AM

Last enriched: 2/27/2026, 6:57:38 PM

Last updated: 3/24/2026, 1:30:44 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses