Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11372: CWE-862 Missing Authorization in thimpress LearnPress – WordPress LMS Plugin

0
Medium
VulnerabilityCVE-2025-11372cvecve-2025-11372cwe-862
Published: Sat Oct 18 2025 (10/18/2025, 06:42:48 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to modification of data in all versions up to, and including, 4.2.9.2. This is due to missing capability checks on the Admin Tools REST endpoints which are registered with permission_callback set to __return_true. This makes it possible for unauthenticated attackers to perform destructive database operations including dropping indexes on any table (including WordPress core tables like wp_options), creating duplicate configuration entries, and degrading site performance via the /wp-json/lp/v1/admin/tools/create-indexs endpoint granted they can provide table names.

AI-Powered Analysis

AILast updated: 10/25/2025, 09:56:49 UTC

Technical Analysis

CVE-2025-11372 is a missing authorization vulnerability (CWE-862) in the LearnPress WordPress LMS plugin, affecting all versions up to 4.2.9.2. The root cause is the absence of proper capability checks on certain admin REST API endpoints, specifically the /wp-json/lp/v1/admin/tools/create-indexs endpoint. This endpoint is registered with a permission_callback set to __return_true, effectively allowing any unauthenticated user to invoke it. Exploitation enables attackers to execute destructive database operations such as dropping indexes on arbitrary tables, including critical WordPress core tables like wp_options, which can disrupt site functionality. Additionally, attackers can create duplicate configuration entries, potentially causing configuration conflicts or malfunctions, and degrade site performance by manipulating database indexes. The vulnerability does not impact confidentiality directly but severely affects integrity and availability. No authentication or user interaction is required, making exploitation straightforward if the endpoint is accessible. While no public exploits are known at this time, the vulnerability's nature and ease of exploitation make it a significant threat to sites using LearnPress. The CVSS 3.1 score of 6.5 reflects these factors, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L).

Potential Impact

For European organizations, this vulnerability poses a risk of severe disruption to WordPress-based LMS platforms using the LearnPress plugin. The ability for unauthenticated attackers to perform destructive database operations can lead to data integrity loss, site outages, and degraded performance, impacting e-learning services, user access, and organizational operations dependent on these platforms. Educational institutions, training providers, and enterprises relying on LearnPress for course delivery could face operational downtime and reputational damage. Although confidentiality is not directly compromised, the loss of data integrity and availability can indirectly affect compliance with data protection regulations such as GDPR if service disruptions impact personal data processing. The ease of exploitation and lack of authentication requirements increase the likelihood of attacks, especially in environments where the REST API is publicly accessible. Organizations may also face increased incident response costs and potential regulatory scrutiny if service disruptions affect users or data processing.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the vulnerable REST API endpoints by implementing web application firewall (WAF) rules that block unauthenticated requests to /wp-json/lp/v1/admin/tools/* paths. Organizations should disable or restrict the REST API for unauthenticated users where possible. Applying the latest plugin updates from the vendor once available is critical; if no patch is currently released, consider temporarily deactivating the LearnPress plugin or isolating the affected WordPress instance from public access. Monitoring web server logs for suspicious requests targeting the vulnerable endpoints can help detect exploitation attempts early. Additionally, backing up WordPress databases regularly and verifying backup integrity ensures recovery capability in case of destructive attacks. Organizations should also review and harden WordPress user roles and permissions to minimize exposure. Finally, consider implementing network-level access controls to limit REST API access to trusted IP addresses or VPN users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-06T14:44:39.048Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f33944197c8629076f80c5

Added to database: 10/18/2025, 6:52:52 AM

Last enriched: 10/25/2025, 9:56:49 AM

Last updated: 11/28/2025, 5:31:28 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats