CVE-2025-11368: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in thimpress LearnPress – WordPress LMS Plugin
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 4.2.9.4. This is due to missing capability checks in the REST endpoint /wp-json/lp/v1/load_content_via_ajax which allows arbitrary callback execution of admin-only template methods. This makes it possible for unauthenticated attackers to retrieve admin curriculum HTML, quiz questions with correct answers, course materials, and other sensitive educational content via the REST API endpoint granted they can supply valid numeric IDs.
AI Analysis
Technical Summary
CVE-2025-11368 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the LearnPress WordPress LMS plugin, versions up to and including 4.2.9.4. The issue arises from missing capability checks in the REST API endpoint /wp-json/lp/v1/load_content_via_ajax. This endpoint allows unauthenticated users to invoke admin-only template methods by supplying arbitrary numeric IDs, leading to unauthorized disclosure of sensitive educational content. Specifically, attackers can retrieve admin curriculum HTML, quiz questions along with correct answers, course materials, and other protected data. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation and the confidentiality impact, while integrity and availability remain unaffected. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to educational institutions and organizations relying on LearnPress for managing course content and assessments, as sensitive information leakage could undermine academic integrity and privacy.
Potential Impact
The primary impact of CVE-2025-11368 is the unauthorized disclosure of sensitive educational content, including course materials, curriculum details, and quiz answers. This exposure can lead to academic dishonesty, loss of trust in the educational platform, and potential privacy violations for students and instructors. Organizations using LearnPress may face reputational damage and compliance issues, especially if personal or proprietary educational content is leaked. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for online learning environments. Attackers could exploit this flaw to gain unfair advantages in assessments or to harvest intellectual property. The ease of exploitation without authentication increases the threat level, particularly for publicly accessible WordPress LMS sites. The absence of known exploits currently provides a window for mitigation, but the risk remains significant given the widespread use of WordPress and LearnPress in education worldwide.
Mitigation Recommendations
To mitigate CVE-2025-11368, organizations should immediately update the LearnPress plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to /wp-json/lp/v1/load_content_via_ajax. Additionally, disabling REST API access for unauthenticated users or limiting it via authentication plugins can reduce exposure. Review and harden WordPress user roles and permissions to ensure that sensitive content is not accessible beyond intended users. Monitoring web server logs for suspicious requests targeting the vulnerable endpoint can help detect exploitation attempts. Educating site administrators about the risk and encouraging regular plugin updates are critical. Finally, consider isolating LMS content behind VPNs or intranet access controls where feasible to further reduce exposure.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, Japan, South Korea
CVE-2025-11368: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in thimpress LearnPress – WordPress LMS Plugin
Description
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 4.2.9.4. This is due to missing capability checks in the REST endpoint /wp-json/lp/v1/load_content_via_ajax which allows arbitrary callback execution of admin-only template methods. This makes it possible for unauthenticated attackers to retrieve admin curriculum HTML, quiz questions with correct answers, course materials, and other sensitive educational content via the REST API endpoint granted they can supply valid numeric IDs.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11368 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the LearnPress WordPress LMS plugin, versions up to and including 4.2.9.4. The issue arises from missing capability checks in the REST API endpoint /wp-json/lp/v1/load_content_via_ajax. This endpoint allows unauthenticated users to invoke admin-only template methods by supplying arbitrary numeric IDs, leading to unauthorized disclosure of sensitive educational content. Specifically, attackers can retrieve admin curriculum HTML, quiz questions along with correct answers, course materials, and other protected data. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score is 5.3 (medium), reflecting the ease of exploitation and the confidentiality impact, while integrity and availability remain unaffected. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to educational institutions and organizations relying on LearnPress for managing course content and assessments, as sensitive information leakage could undermine academic integrity and privacy.
Potential Impact
The primary impact of CVE-2025-11368 is the unauthorized disclosure of sensitive educational content, including course materials, curriculum details, and quiz answers. This exposure can lead to academic dishonesty, loss of trust in the educational platform, and potential privacy violations for students and instructors. Organizations using LearnPress may face reputational damage and compliance issues, especially if personal or proprietary educational content is leaked. Although the vulnerability does not affect system integrity or availability, the confidentiality breach alone can have serious consequences for online learning environments. Attackers could exploit this flaw to gain unfair advantages in assessments or to harvest intellectual property. The ease of exploitation without authentication increases the threat level, particularly for publicly accessible WordPress LMS sites. The absence of known exploits currently provides a window for mitigation, but the risk remains significant given the widespread use of WordPress and LearnPress in education worldwide.
Mitigation Recommendations
To mitigate CVE-2025-11368, organizations should immediately update the LearnPress plugin to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict access to the vulnerable REST API endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests to /wp-json/lp/v1/load_content_via_ajax. Additionally, disabling REST API access for unauthenticated users or limiting it via authentication plugins can reduce exposure. Review and harden WordPress user roles and permissions to ensure that sensitive content is not accessible beyond intended users. Monitoring web server logs for suspicious requests targeting the vulnerable endpoint can help detect exploitation attempts. Educating site administrators about the risk and encouraging regular plugin updates are critical. Finally, consider isolating LMS content behind VPNs or intranet access controls where feasible to further reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-06T13:47:47.518Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ffc17a535ade79490ffb1
Added to database: 11/21/2025, 5:43:51 AM
Last enriched: 2/27/2026, 6:57:38 PM
Last updated: 3/24/2026, 1:30:44 AM
Views: 124
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.