CVE-2025-11923: CWE-269 Improper Privilege Management in chrisbadgett LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes
The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to privilege escalation. This is due to the plugin not properly validating a user's identity prior to allowing them to modify their own role via the REST API. The permission check in the update_item_permissions_check() function returns true when a user updates their own account without verifying the role changes. This makes it possible for authenticated attackers, with student-level access and above, to escalate their privileges to administrator by updating their own roles array via a crafted REST API request. Another endpoint intended for instructors also provides an attack vector. Affected version ranges are 3.5.3-3.41.2, 4.0.0-4.21.3, 5.0.0-5.10.0, 6.0.0-6.11.0, 7.0.0-7.8.7, 8.0.0-8.0.7, 9.0.0-9.0.7, 9.1.0.
AI Analysis
Technical Summary
CVE-2025-11923 is a critical privilege escalation vulnerability identified in the LifterLMS plugin for WordPress, which is widely used for managing eLearning, online courses, and quizzes. The vulnerability stems from improper privilege management (CWE-269) within the plugin’s REST API endpoints. Specifically, the update_item_permissions_check() function fails to adequately verify whether a user is authorized to change their own role. When an authenticated user with at least student-level privileges sends a crafted REST API request to update their roles array, the permission check erroneously returns true, allowing them to escalate their privileges to administrator. Additionally, another endpoint intended for instructors also provides an attack vector. This flaw affects multiple major versions of the plugin, from 3.5.3 through 9.1.0, indicating a long-standing issue across many releases. The vulnerability does not require user interaction but does require authentication, making it exploitable by any logged-in user with minimal privileges. The CVSS 3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) highlights the ease of remote exploitation over the network, low attack complexity, and the severe impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WordPress sites using LifterLMS, as attackers can gain full administrative control, potentially leading to site defacement, data theft, or persistent backdoors.
Potential Impact
For European organizations, especially educational institutions, training providers, and corporate eLearning platforms relying on WordPress with LifterLMS, this vulnerability presents a severe threat. Unauthorized privilege escalation to administrator level allows attackers to fully control the WordPress environment, including installing malicious plugins, altering course content, stealing sensitive user data, and disrupting service availability. Given the widespread adoption of WordPress and LifterLMS in Europe’s education sector, exploitation could lead to significant reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption. Attackers could also leverage compromised sites as pivot points for further network intrusions. The vulnerability’s presence across multiple plugin versions increases the likelihood that many European organizations remain exposed, particularly those slow to update or unaware of the risk. The lack of known exploits in the wild currently provides a window for proactive defense but also underscores the urgency of mitigation before active exploitation emerges.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if LifterLMS is in use and determine the plugin version. Since no official patches or updates are linked in the provided data, organizations should: 1) Temporarily disable the REST API endpoints related to user role modifications if feasible, using WordPress hooks or firewall rules to block suspicious REST API requests targeting role changes. 2) Restrict access to the WordPress admin and REST API to trusted IP ranges where possible. 3) Implement strict monitoring and alerting on REST API calls that attempt to modify user roles or permissions. 4) Enforce strong authentication and consider multi-factor authentication for all users with elevated privileges. 5) Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise. 6) Engage with the plugin vendor or community to obtain or verify availability of patches and apply them promptly once released. 7) Educate site administrators and users about the risks of privilege escalation and suspicious activity. These targeted measures go beyond generic advice by focusing on the REST API attack surface and role modification vectors specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-11923: CWE-269 Improper Privilege Management in chrisbadgett LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes
Description
The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to privilege escalation. This is due to the plugin not properly validating a user's identity prior to allowing them to modify their own role via the REST API. The permission check in the update_item_permissions_check() function returns true when a user updates their own account without verifying the role changes. This makes it possible for authenticated attackers, with student-level access and above, to escalate their privileges to administrator by updating their own roles array via a crafted REST API request. Another endpoint intended for instructors also provides an attack vector. Affected version ranges are 3.5.3-3.41.2, 4.0.0-4.21.3, 5.0.0-5.10.0, 6.0.0-6.11.0, 7.0.0-7.8.7, 8.0.0-8.0.7, 9.0.0-9.0.7, 9.1.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-11923 is a critical privilege escalation vulnerability identified in the LifterLMS plugin for WordPress, which is widely used for managing eLearning, online courses, and quizzes. The vulnerability stems from improper privilege management (CWE-269) within the plugin’s REST API endpoints. Specifically, the update_item_permissions_check() function fails to adequately verify whether a user is authorized to change their own role. When an authenticated user with at least student-level privileges sends a crafted REST API request to update their roles array, the permission check erroneously returns true, allowing them to escalate their privileges to administrator. Additionally, another endpoint intended for instructors also provides an attack vector. This flaw affects multiple major versions of the plugin, from 3.5.3 through 9.1.0, indicating a long-standing issue across many releases. The vulnerability does not require user interaction but does require authentication, making it exploitable by any logged-in user with minimal privileges. The CVSS 3.1 score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) highlights the ease of remote exploitation over the network, low attack complexity, and the severe impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to WordPress sites using LifterLMS, as attackers can gain full administrative control, potentially leading to site defacement, data theft, or persistent backdoors.
Potential Impact
For European organizations, especially educational institutions, training providers, and corporate eLearning platforms relying on WordPress with LifterLMS, this vulnerability presents a severe threat. Unauthorized privilege escalation to administrator level allows attackers to fully control the WordPress environment, including installing malicious plugins, altering course content, stealing sensitive user data, and disrupting service availability. Given the widespread adoption of WordPress and LifterLMS in Europe’s education sector, exploitation could lead to significant reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption. Attackers could also leverage compromised sites as pivot points for further network intrusions. The vulnerability’s presence across multiple plugin versions increases the likelihood that many European organizations remain exposed, particularly those slow to update or unaware of the risk. The lack of known exploits in the wild currently provides a window for proactive defense but also underscores the urgency of mitigation before active exploitation emerges.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if LifterLMS is in use and determine the plugin version. Since no official patches or updates are linked in the provided data, organizations should: 1) Temporarily disable the REST API endpoints related to user role modifications if feasible, using WordPress hooks or firewall rules to block suspicious REST API requests targeting role changes. 2) Restrict access to the WordPress admin and REST API to trusted IP ranges where possible. 3) Implement strict monitoring and alerting on REST API calls that attempt to modify user roles or permissions. 4) Enforce strong authentication and consider multi-factor authentication for all users with elevated privileges. 5) Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise. 6) Engage with the plugin vendor or community to obtain or verify availability of patches and apply them promptly once released. 7) Educate site administrators and users about the risks of privilege escalation and suspicious activity. These targeted measures go beyond generic advice by focusing on the REST API attack surface and role modification vectors specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-17T18:50:39.481Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691553e024a15f0eafbbc090
Added to database: 11/13/2025, 3:43:28 AM
Last enriched: 11/20/2025, 4:47:59 AM
Last updated: 11/22/2025, 2:52:08 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.